From a006e81b4689ebf458d995a19eb475894606a3cd Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Tue, 23 May 2023 14:00:36 +0000 Subject: [PATCH] Auto-Update: 2023-05-23T14:00:32.463747+00:00 --- CVE-2018/CVE-2018-171xx/CVE-2018-17191.json | 6 +- CVE-2019/CVE-2019-126xx/CVE-2019-12671.json | 92 ++++++------ CVE-2019/CVE-2019-160xx/CVE-2019-16010.json | 18 +-- CVE-2019/CVE-2019-160xx/CVE-2019-16012.json | 18 +-- CVE-2020/CVE-2020-200xx/CVE-2020-20012.json | 4 +- CVE-2020/CVE-2020-31xx/CVE-2020-3141.json | 62 ++++---- CVE-2020/CVE-2020-31xx/CVE-2020-3180.json | 22 +-- CVE-2020/CVE-2020-32xx/CVE-2020-3264.json | 18 +-- CVE-2020/CVE-2020-32xx/CVE-2020-3265.json | 18 +-- CVE-2020/CVE-2020-32xx/CVE-2020-3266.json | 18 +-- CVE-2020/CVE-2020-33xx/CVE-2020-3315.json | 32 ++--- CVE-2020/CVE-2020-33xx/CVE-2020-3372.json | 18 +-- CVE-2020/CVE-2020-33xx/CVE-2020-3378.json | 18 +-- CVE-2020/CVE-2020-33xx/CVE-2020-3381.json | 18 +-- CVE-2020/CVE-2020-33xx/CVE-2020-3387.json | 18 +-- CVE-2020/CVE-2020-33xx/CVE-2020-3388.json | 18 +-- CVE-2020/CVE-2020-33xx/CVE-2020-3393.json | 62 ++++---- CVE-2020/CVE-2020-33xx/CVE-2020-3396.json | 152 ++++++++++---------- CVE-2020/CVE-2020-34xx/CVE-2020-3401.json | 18 +-- CVE-2020/CVE-2020-34xx/CVE-2020-3404.json | 62 ++++---- CVE-2020/CVE-2020-34xx/CVE-2020-3407.json | 62 ++++---- CVE-2020/CVE-2020-34xx/CVE-2020-3408.json | 62 ++++---- CVE-2020/CVE-2020-35xx/CVE-2020-3503.json | 62 ++++---- CVE-2020/CVE-2020-35xx/CVE-2020-3508.json | 152 ++++++++++---------- CVE-2020/CVE-2020-35xx/CVE-2020-3511.json | 152 ++++++++++---------- CVE-2021/CVE-2021-347xx/CVE-2021-34723.json | 26 ++-- CVE-2022/CVE-2022-207xx/CVE-2022-20775.json | 92 ++++++------ CVE-2022/CVE-2022-208xx/CVE-2022-20818.json | 92 ++++++------ CVE-2022/CVE-2022-466xx/CVE-2022-46658.json | 4 +- CVE-2022/CVE-2022-467xx/CVE-2022-46738.json | 4 +- CVE-2022/CVE-2022-473xx/CVE-2022-47311.json | 4 +- CVE-2022/CVE-2022-473xx/CVE-2022-47320.json | 4 +- CVE-2022/CVE-2022-49xx/CVE-2022-4945.json | 4 +- CVE-2023/CVE-2023-226xx/CVE-2023-22654.json | 4 +- CVE-2023/CVE-2023-235xx/CVE-2023-23545.json | 4 +- CVE-2023/CVE-2023-236xx/CVE-2023-23693.json | 4 +- CVE-2023/CVE-2023-236xx/CVE-2023-23694.json | 4 +- CVE-2023/CVE-2023-237xx/CVE-2023-23706.json | 55 +++++++ CVE-2023/CVE-2023-237xx/CVE-2023-23724.json | 55 +++++++ CVE-2023/CVE-2023-24xx/CVE-2023-2483.json | 15 ++ CVE-2023/CVE-2023-251xx/CVE-2023-25183.json | 4 +- CVE-2023/CVE-2023-254xx/CVE-2023-25440.json | 4 +- CVE-2023/CVE-2023-254xx/CVE-2023-25472.json | 55 +++++++ CVE-2023/CVE-2023-254xx/CVE-2023-25481.json | 55 +++++++ CVE-2023/CVE-2023-257xx/CVE-2023-25707.json | 55 +++++++ CVE-2023/CVE-2023-259xx/CVE-2023-25946.json | 4 +- CVE-2023/CVE-2023-259xx/CVE-2023-25953.json | 4 +- CVE-2023/CVE-2023-25xx/CVE-2023-2504.json | 4 +- CVE-2023/CVE-2023-25xx/CVE-2023-2505.json | 4 +- CVE-2023/CVE-2023-265xx/CVE-2023-26595.json | 4 +- CVE-2023/CVE-2023-270xx/CVE-2023-27066.json | 4 +- CVE-2023/CVE-2023-270xx/CVE-2023-27067.json | 4 +- CVE-2023/CVE-2023-270xx/CVE-2023-27068.json | 4 +- CVE-2023/CVE-2023-273xx/CVE-2023-27304.json | 4 +- CVE-2023/CVE-2023-273xx/CVE-2023-27384.json | 4 +- CVE-2023/CVE-2023-273xx/CVE-2023-27387.json | 4 +- CVE-2023/CVE-2023-273xx/CVE-2023-27388.json | 4 +- CVE-2023/CVE-2023-273xx/CVE-2023-27397.json | 4 +- CVE-2023/CVE-2023-275xx/CVE-2023-27507.json | 4 +- CVE-2023/CVE-2023-275xx/CVE-2023-27512.json | 4 +- CVE-2023/CVE-2023-275xx/CVE-2023-27514.json | 4 +- CVE-2023/CVE-2023-275xx/CVE-2023-27518.json | 4 +- CVE-2023/CVE-2023-275xx/CVE-2023-27521.json | 4 +- CVE-2023/CVE-2023-279xx/CVE-2023-27920.json | 4 +- CVE-2023/CVE-2023-279xx/CVE-2023-27921.json | 4 +- CVE-2023/CVE-2023-279xx/CVE-2023-27922.json | 4 +- CVE-2023/CVE-2023-279xx/CVE-2023-27923.json | 4 +- CVE-2023/CVE-2023-279xx/CVE-2023-27925.json | 4 +- CVE-2023/CVE-2023-279xx/CVE-2023-27926.json | 4 +- CVE-2023/CVE-2023-283xx/CVE-2023-28367.json | 4 +- CVE-2023/CVE-2023-283xx/CVE-2023-28386.json | 4 +- CVE-2023/CVE-2023-283xx/CVE-2023-28390.json | 4 +- CVE-2023/CVE-2023-283xx/CVE-2023-28392.json | 4 +- CVE-2023/CVE-2023-283xx/CVE-2023-28394.json | 4 +- CVE-2023/CVE-2023-284xx/CVE-2023-28408.json | 4 +- CVE-2023/CVE-2023-284xx/CVE-2023-28409.json | 4 +- CVE-2023/CVE-2023-284xx/CVE-2023-28412.json | 4 +- CVE-2023/CVE-2023-284xx/CVE-2023-28413.json | 4 +- CVE-2023/CVE-2023-284xx/CVE-2023-28467.json | 4 +- CVE-2023/CVE-2023-286xx/CVE-2023-28649.json | 4 +- CVE-2023/CVE-2023-28xx/CVE-2023-2837.json | 4 +- CVE-2023/CVE-2023-28xx/CVE-2023-2838.json | 4 +- CVE-2023/CVE-2023-28xx/CVE-2023-2839.json | 4 +- CVE-2023/CVE-2023-28xx/CVE-2023-2840.json | 4 +- CVE-2023/CVE-2023-28xx/CVE-2023-2844.json | 4 +- CVE-2023/CVE-2023-28xx/CVE-2023-2845.json | 4 +- CVE-2023/CVE-2023-298xx/CVE-2023-29838.json | 4 +- CVE-2023/CVE-2023-299xx/CVE-2023-29919.json | 4 +- CVE-2023/CVE-2023-304xx/CVE-2023-30469.json | 4 +- CVE-2023/CVE-2023-311xx/CVE-2023-31193.json | 4 +- CVE-2023/CVE-2023-312xx/CVE-2023-31240.json | 4 +- CVE-2023/CVE-2023-312xx/CVE-2023-31241.json | 4 +- CVE-2023/CVE-2023-312xx/CVE-2023-31245.json | 4 +- CVE-2023/CVE-2023-315xx/CVE-2023-31584.json | 4 +- CVE-2023/CVE-2023-316xx/CVE-2023-31664.json | 4 +- CVE-2023/CVE-2023-316xx/CVE-2023-31669.json | 20 +++ CVE-2023/CVE-2023-316xx/CVE-2023-31670.json | 4 +- CVE-2023/CVE-2023-316xx/CVE-2023-31689.json | 4 +- CVE-2023/CVE-2023-317xx/CVE-2023-31708.json | 4 +- CVE-2023/CVE-2023-317xx/CVE-2023-31740.json | 4 +- CVE-2023/CVE-2023-317xx/CVE-2023-31741.json | 4 +- CVE-2023/CVE-2023-317xx/CVE-2023-31742.json | 4 +- CVE-2023/CVE-2023-318xx/CVE-2023-31814.json | 4 +- CVE-2023/CVE-2023-318xx/CVE-2023-31816.json | 4 +- CVE-2023/CVE-2023-318xx/CVE-2023-31826.json | 4 +- CVE-2023/CVE-2023-319xx/CVE-2023-31994.json | 4 +- CVE-2023/CVE-2023-319xx/CVE-2023-31995.json | 4 +- CVE-2023/CVE-2023-319xx/CVE-2023-31996.json | 4 +- CVE-2023/CVE-2023-332xx/CVE-2023-33203.json | 6 +- CVE-2023/CVE-2023-333xx/CVE-2023-33338.json | 20 +++ README.md | 47 ++++-- 111 files changed, 1215 insertions(+), 852 deletions(-) create mode 100644 CVE-2023/CVE-2023-237xx/CVE-2023-23706.json create mode 100644 CVE-2023/CVE-2023-237xx/CVE-2023-23724.json create mode 100644 CVE-2023/CVE-2023-24xx/CVE-2023-2483.json create mode 100644 CVE-2023/CVE-2023-254xx/CVE-2023-25472.json create mode 100644 CVE-2023/CVE-2023-254xx/CVE-2023-25481.json create mode 100644 CVE-2023/CVE-2023-257xx/CVE-2023-25707.json create mode 100644 CVE-2023/CVE-2023-316xx/CVE-2023-31669.json create mode 100644 CVE-2023/CVE-2023-333xx/CVE-2023-33338.json diff --git a/CVE-2018/CVE-2018-171xx/CVE-2018-17191.json b/CVE-2018/CVE-2018-171xx/CVE-2018-17191.json index f7743b6aac7..dd4d3b52217 100644 --- a/CVE-2018/CVE-2018-171xx/CVE-2018-17191.json +++ b/CVE-2018/CVE-2018-171xx/CVE-2018-17191.json @@ -2,7 +2,7 @@ "id": "CVE-2018-17191", "sourceIdentifier": "security@apache.org", "published": "2018-12-31T14:29:00.240", - "lastModified": "2019-10-03T00:03:26.223", + "lastModified": "2023-05-23T13:31:35.920", "vulnStatus": "Analyzed", "descriptions": [ { @@ -84,8 +84,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:apache:netbeans:9.0:incubating:*:*:*:*:*:*", - "matchCriteriaId": "C320207E-B417-4343-878E-9CF674614A10" + "criteria": "cpe:2.3:a:apache:netbeans:9.0:-:*:*:*:*:*:*", + "matchCriteriaId": "5B8A3293-9EB3-44A7-9CBA-B2594311D8F4" } ] } diff --git a/CVE-2019/CVE-2019-126xx/CVE-2019-12671.json b/CVE-2019/CVE-2019-126xx/CVE-2019-12671.json index 69aa58a4021..02ec3dafe08 100644 --- a/CVE-2019/CVE-2019-126xx/CVE-2019-12671.json +++ b/CVE-2019/CVE-2019-126xx/CVE-2019-12671.json @@ -2,7 +2,7 @@ "id": "CVE-2019-12671", "sourceIdentifier": "ykramarz@cisco.com", "published": "2019-09-25T21:15:11.750", - "lastModified": "2019-10-09T23:46:02.310", + "lastModified": "2023-05-23T13:55:46.380", "vulnStatus": "Modified", "descriptions": [ { @@ -131,6 +131,51 @@ "operator": "OR", "negate": false, "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:4321\\/k9-rf_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "05C90C43-2D7D-43F8-AD7F-421878909AE2" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:4321\\/k9-ws_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "445597DA-7EEC-470D-9A71-BC43A9F7DE5E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:4321\\/k9_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "86049773-C88D-4A26-A0D3-D40F3C312AEC" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:4331\\/k9-rf_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6AB4B7C2-4D45-4267-BCBB-57D36C6104A3" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:4331\\/k9-ws_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3B8A4630-8B21-4994-8EF5-E105593A64E5" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:4331\\/k9_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F799DC02-EB06-458C-8545-A174475FE7A2" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:4351\\/k9-rf_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B89FBA68-A8ED-4C5A-916E-A68468F59730" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:4351\\/k9-ws_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CD272E6E-2ED1-4408-8FF7-0B82F9DCBEF8" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:4351\\/k9_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DC278B77-AD63-42AD-B9E8-EE4DE97E27E9" + }, { "vulnerable": false, "criteria": "cpe:2.3:h:cisco:asr1001-hx:-:*:*:*:*:*:*:*", @@ -211,51 +256,6 @@ "criteria": "cpe:2.3:h:cisco:encs5412\\/k9-rf:-:*:*:*:*:*:*:*", "matchCriteriaId": "313B08AE-E0ED-43E8-A182-9578CFA1BFD7" }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:cisco:isr4321\\/k9:-:*:*:*:*:*:*:*", - "matchCriteriaId": "CC2CD40F-62E2-456B-AFA0-C063D773181E" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:cisco:isr4321\\/k9-rf:-:*:*:*:*:*:*:*", - "matchCriteriaId": "7711CA49-0F3E-4B65-B9A1-039C9DF8149B" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:cisco:isr4321\\/k9-ws:-:*:*:*:*:*:*:*", - "matchCriteriaId": "48DF5DA1-9147-4EE6-9D32-F7926091C5A2" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:cisco:isr4331\\/k9:-:*:*:*:*:*:*:*", - "matchCriteriaId": "36C18F97-B0BA-47CC-BC27-7285EF5641AE" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:cisco:isr4331\\/k9-rf:-:*:*:*:*:*:*:*", - "matchCriteriaId": "C4AA2977-BDF7-4894-9CF8-AD65DAF931EA" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:cisco:isr4331\\/k9-ws:-:*:*:*:*:*:*:*", - "matchCriteriaId": "40816759-0BE1-4728-A13F-5501E3AF707C" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:cisco:isr4351\\/k9:-:*:*:*:*:*:*:*", - "matchCriteriaId": "9946FD4E-4579-4E06-9CDC-321A8820BC0C" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:cisco:isr4351\\/k9-rf:-:*:*:*:*:*:*:*", - "matchCriteriaId": "E7CB8BF7-588F-4505-BD5B-2DF8B27A722D" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:cisco:isr4351\\/k9-ws:-:*:*:*:*:*:*:*", - "matchCriteriaId": "4A8CD7F3-2A4E-4C79-A9CD-F37E63E94625" - }, { "vulnerable": false, "criteria": "cpe:2.3:h:cisco:sasr1k1xucmk9-1610:-:*:*:*:*:*:*:*", diff --git a/CVE-2019/CVE-2019-160xx/CVE-2019-16010.json b/CVE-2019/CVE-2019-160xx/CVE-2019-16010.json index cae9f545b36..f6f897bbaee 100644 --- a/CVE-2019/CVE-2019-160xx/CVE-2019-16010.json +++ b/CVE-2019/CVE-2019-160xx/CVE-2019-16010.json @@ -2,7 +2,7 @@ "id": "CVE-2019-16010", "sourceIdentifier": "ykramarz@cisco.com", "published": "2020-03-19T16:15:14.517", - "lastModified": "2020-03-23T17:56:58.380", + "lastModified": "2023-05-23T13:55:46.380", "vulnStatus": "Analyzed", "descriptions": [ { @@ -129,23 +129,23 @@ "cpeMatch": [ { "vulnerable": false, - "criteria": "cpe:2.3:h:cisco:isr1100-4g:-:*:*:*:*:*:*:*", - "matchCriteriaId": "30EAEC4D-A1F5-4544-92FB-3377549FC3CF" + "criteria": "cpe:2.3:h:cisco:1100-4g_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0F77CD6A-83DA-4F31-A128-AD6DAECD623B" }, { "vulnerable": false, - "criteria": "cpe:2.3:h:cisco:isr1100-4gltegb:-:*:*:*:*:*:*:*", - "matchCriteriaId": "793ECE15-E2A0-4424-8BA0-98F580820844" + "criteria": "cpe:2.3:h:cisco:1100-4gltegb_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "62564BB8-1282-4597-A645-056298BE7CCB" }, { "vulnerable": false, - "criteria": "cpe:2.3:h:cisco:isr1100-4gltena:-:*:*:*:*:*:*:*", - "matchCriteriaId": "A45C786B-6D9F-4FCB-AB54-1E417723C415" + "criteria": "cpe:2.3:h:cisco:1100-4gltena_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "80E9CC47-3D7C-437A-85BE-4BB94C8AF1B8" }, { "vulnerable": false, - "criteria": "cpe:2.3:h:cisco:isr1100-6g:-:*:*:*:*:*:*:*", - "matchCriteriaId": "3105C8BD-62BC-4FE9-BE51-3B751FDDC202" + "criteria": "cpe:2.3:h:cisco:1100-6g_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2B68B363-3C57-4E95-8B13-0F9B59D551F7" }, { "vulnerable": false, diff --git a/CVE-2019/CVE-2019-160xx/CVE-2019-16012.json b/CVE-2019/CVE-2019-160xx/CVE-2019-16012.json index 8628b1db6d1..3796c8fe762 100644 --- a/CVE-2019/CVE-2019-160xx/CVE-2019-16012.json +++ b/CVE-2019/CVE-2019-160xx/CVE-2019-16012.json @@ -2,7 +2,7 @@ "id": "CVE-2019-16012", "sourceIdentifier": "ykramarz@cisco.com", "published": "2020-03-19T16:15:14.627", - "lastModified": "2020-03-23T17:18:01.463", + "lastModified": "2023-05-23T13:55:46.380", "vulnStatus": "Analyzed", "descriptions": [ { @@ -129,23 +129,23 @@ "cpeMatch": [ { "vulnerable": false, - "criteria": "cpe:2.3:h:cisco:isr1100-4g:-:*:*:*:*:*:*:*", - "matchCriteriaId": "30EAEC4D-A1F5-4544-92FB-3377549FC3CF" + "criteria": "cpe:2.3:h:cisco:1100-4g_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0F77CD6A-83DA-4F31-A128-AD6DAECD623B" }, { "vulnerable": false, - "criteria": "cpe:2.3:h:cisco:isr1100-4gltegb:-:*:*:*:*:*:*:*", - "matchCriteriaId": "793ECE15-E2A0-4424-8BA0-98F580820844" + "criteria": "cpe:2.3:h:cisco:1100-4gltegb_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "62564BB8-1282-4597-A645-056298BE7CCB" }, { "vulnerable": false, - "criteria": "cpe:2.3:h:cisco:isr1100-4gltena:-:*:*:*:*:*:*:*", - "matchCriteriaId": "A45C786B-6D9F-4FCB-AB54-1E417723C415" + "criteria": "cpe:2.3:h:cisco:1100-4gltena_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "80E9CC47-3D7C-437A-85BE-4BB94C8AF1B8" }, { "vulnerable": false, - "criteria": "cpe:2.3:h:cisco:isr1100-6g:-:*:*:*:*:*:*:*", - "matchCriteriaId": "3105C8BD-62BC-4FE9-BE51-3B751FDDC202" + "criteria": "cpe:2.3:h:cisco:1100-6g_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2B68B363-3C57-4E95-8B13-0F9B59D551F7" }, { "vulnerable": false, diff --git a/CVE-2020/CVE-2020-200xx/CVE-2020-20012.json b/CVE-2020/CVE-2020-200xx/CVE-2020-20012.json index b4802cfae29..84094619a4f 100644 --- a/CVE-2020/CVE-2020-200xx/CVE-2020-20012.json +++ b/CVE-2020/CVE-2020-200xx/CVE-2020-20012.json @@ -2,8 +2,8 @@ "id": "CVE-2020-20012", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-23T01:15:09.627", - "lastModified": "2023-05-23T01:15:09.627", - "vulnStatus": "Received", + "lastModified": "2023-05-23T13:04:39.657", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2020/CVE-2020-31xx/CVE-2020-3141.json b/CVE-2020/CVE-2020-31xx/CVE-2020-3141.json index f45192c7cb9..cfca49f49f5 100644 --- a/CVE-2020/CVE-2020-31xx/CVE-2020-3141.json +++ b/CVE-2020/CVE-2020-31xx/CVE-2020-3141.json @@ -2,7 +2,7 @@ "id": "CVE-2020-3141", "sourceIdentifier": "ykramarz@cisco.com", "published": "2020-09-24T18:15:17.323", - "lastModified": "2023-05-22T18:57:24.750", + "lastModified": "2023-05-23T13:55:46.380", "vulnStatus": "Analyzed", "descriptions": [ { @@ -141,16 +141,46 @@ "operator": "OR", "negate": false, "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:1100-4g_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0F77CD6A-83DA-4F31-A128-AD6DAECD623B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:1100-4gltegb_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "62564BB8-1282-4597-A645-056298BE7CCB" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:1100-4gltena_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "80E9CC47-3D7C-437A-85BE-4BB94C8AF1B8" + }, { "vulnerable": false, "criteria": "cpe:2.3:h:cisco:1100-4p_integrated_services_router:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2D2305B-B69E-4F74-A44E-07B3205CE9F7" }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:1100-6g_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2B68B363-3C57-4E95-8B13-0F9B59D551F7" + }, { "vulnerable": false, "criteria": "cpe:2.3:h:cisco:1100-8p_integrated_services_router:-:*:*:*:*:*:*:*", "matchCriteriaId": "26DD41B3-1D1D-44D3-BA8E-5A66AFEE77E6" }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:1100-lte_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EBE4E146-1D77-4F15-AE58-3C1CE5DB62C5" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:1100_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1952B64C-4AE0-4CCB-86C5-8D1FF6A12822" + }, { "vulnerable": false, "criteria": "cpe:2.3:h:cisco:1101-4p_integrated_services_router:-:*:*:*:*:*:*:*", @@ -576,36 +606,6 @@ "criteria": "cpe:2.3:h:cisco:csr_1000v:*:*:*:*:*:*:*:*", "matchCriteriaId": "A7A99113-21C8-4DC4-865B-BEE7401B7720" }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:cisco:isr1100:-:*:*:*:*:*:*:*", - "matchCriteriaId": "9CAAE9BA-E9E6-4D53-B3BB-EBB8231C547D" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:cisco:isr1100-4g:-:*:*:*:*:*:*:*", - "matchCriteriaId": "30EAEC4D-A1F5-4544-92FB-3377549FC3CF" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:cisco:isr1100-4gltegb:-:*:*:*:*:*:*:*", - "matchCriteriaId": "793ECE15-E2A0-4424-8BA0-98F580820844" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:cisco:isr1100-4gltena:-:*:*:*:*:*:*:*", - "matchCriteriaId": "A45C786B-6D9F-4FCB-AB54-1E417723C415" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:cisco:isr1100-6g:-:*:*:*:*:*:*:*", - "matchCriteriaId": "3105C8BD-62BC-4FE9-BE51-3B751FDDC202" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:cisco:isr1100-lte:-:*:*:*:*:*:*:*", - "matchCriteriaId": "10A27FD8-8301-40B9-BEA1-7AC3B623F275" - }, { "vulnerable": false, "criteria": "cpe:2.3:h:cisco:ws-c3650-12x48uq:-:*:*:*:*:*:*:*", diff --git a/CVE-2020/CVE-2020-31xx/CVE-2020-3180.json b/CVE-2020/CVE-2020-31xx/CVE-2020-3180.json index 419c5fd9cdc..bfec8078c99 100644 --- a/CVE-2020/CVE-2020-31xx/CVE-2020-3180.json +++ b/CVE-2020/CVE-2020-31xx/CVE-2020-3180.json @@ -2,7 +2,7 @@ "id": "CVE-2020-3180", "sourceIdentifier": "ykramarz@cisco.com", "published": "2020-07-16T18:15:16.940", - "lastModified": "2020-07-23T19:13:12.977", + "lastModified": "2023-05-23T13:55:46.380", "vulnStatus": "Analyzed", "descriptions": [ { @@ -130,28 +130,28 @@ "cpeMatch": [ { "vulnerable": false, - "criteria": "cpe:2.3:h:cisco:isr1100:-:*:*:*:*:*:*:*", - "matchCriteriaId": "9CAAE9BA-E9E6-4D53-B3BB-EBB8231C547D" + "criteria": "cpe:2.3:h:cisco:1100-4g_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0F77CD6A-83DA-4F31-A128-AD6DAECD623B" }, { "vulnerable": false, - "criteria": "cpe:2.3:h:cisco:isr1100-4g:-:*:*:*:*:*:*:*", - "matchCriteriaId": "30EAEC4D-A1F5-4544-92FB-3377549FC3CF" + "criteria": "cpe:2.3:h:cisco:1100-4gltegb_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "62564BB8-1282-4597-A645-056298BE7CCB" }, { "vulnerable": false, - "criteria": "cpe:2.3:h:cisco:isr1100-4gltegb:-:*:*:*:*:*:*:*", - "matchCriteriaId": "793ECE15-E2A0-4424-8BA0-98F580820844" + "criteria": "cpe:2.3:h:cisco:1100-4gltena_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "80E9CC47-3D7C-437A-85BE-4BB94C8AF1B8" }, { "vulnerable": false, - "criteria": "cpe:2.3:h:cisco:isr1100-4gltena:-:*:*:*:*:*:*:*", - "matchCriteriaId": "A45C786B-6D9F-4FCB-AB54-1E417723C415" + "criteria": "cpe:2.3:h:cisco:1100-6g_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2B68B363-3C57-4E95-8B13-0F9B59D551F7" }, { "vulnerable": false, - "criteria": "cpe:2.3:h:cisco:isr1100-6g:-:*:*:*:*:*:*:*", - "matchCriteriaId": "3105C8BD-62BC-4FE9-BE51-3B751FDDC202" + "criteria": "cpe:2.3:h:cisco:1100_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1952B64C-4AE0-4CCB-86C5-8D1FF6A12822" }, { "vulnerable": false, diff --git a/CVE-2020/CVE-2020-32xx/CVE-2020-3264.json b/CVE-2020/CVE-2020-32xx/CVE-2020-3264.json index 96c7bbcaf26..39f21edd04e 100644 --- a/CVE-2020/CVE-2020-32xx/CVE-2020-3264.json +++ b/CVE-2020/CVE-2020-32xx/CVE-2020-3264.json @@ -2,7 +2,7 @@ "id": "CVE-2020-3264", "sourceIdentifier": "ykramarz@cisco.com", "published": "2020-03-19T16:15:15.487", - "lastModified": "2022-07-19T11:50:53.083", + "lastModified": "2023-05-23T13:55:46.380", "vulnStatus": "Analyzed", "descriptions": [ { @@ -161,23 +161,23 @@ }, { "vulnerable": false, - "criteria": "cpe:2.3:h:cisco:isr1100-4g:-:*:*:*:*:*:*:*", - "matchCriteriaId": "30EAEC4D-A1F5-4544-92FB-3377549FC3CF" + "criteria": "cpe:2.3:h:cisco:1100-4g_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0F77CD6A-83DA-4F31-A128-AD6DAECD623B" }, { "vulnerable": false, - "criteria": "cpe:2.3:h:cisco:isr1100-4gltegb:-:*:*:*:*:*:*:*", - "matchCriteriaId": "793ECE15-E2A0-4424-8BA0-98F580820844" + "criteria": "cpe:2.3:h:cisco:1100-4gltegb_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "62564BB8-1282-4597-A645-056298BE7CCB" }, { "vulnerable": false, - "criteria": "cpe:2.3:h:cisco:isr1100-4gltena:-:*:*:*:*:*:*:*", - "matchCriteriaId": "A45C786B-6D9F-4FCB-AB54-1E417723C415" + "criteria": "cpe:2.3:h:cisco:1100-4gltena_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "80E9CC47-3D7C-437A-85BE-4BB94C8AF1B8" }, { "vulnerable": false, - "criteria": "cpe:2.3:h:cisco:isr1100-6g:-:*:*:*:*:*:*:*", - "matchCriteriaId": "3105C8BD-62BC-4FE9-BE51-3B751FDDC202" + "criteria": "cpe:2.3:h:cisco:1100-6g_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2B68B363-3C57-4E95-8B13-0F9B59D551F7" }, { "vulnerable": false, diff --git a/CVE-2020/CVE-2020-32xx/CVE-2020-3265.json b/CVE-2020/CVE-2020-32xx/CVE-2020-3265.json index 689f7393b44..ce101b95aa6 100644 --- a/CVE-2020/CVE-2020-32xx/CVE-2020-3265.json +++ b/CVE-2020/CVE-2020-32xx/CVE-2020-3265.json @@ -2,7 +2,7 @@ "id": "CVE-2020-3265", "sourceIdentifier": "ykramarz@cisco.com", "published": "2020-03-19T16:15:15.613", - "lastModified": "2022-03-17T16:05:01.163", + "lastModified": "2023-05-23T13:55:46.380", "vulnStatus": "Analyzed", "descriptions": [ { @@ -156,23 +156,23 @@ }, { "vulnerable": false, - "criteria": "cpe:2.3:h:cisco:isr1100-4g:-:*:*:*:*:*:*:*", - "matchCriteriaId": "30EAEC4D-A1F5-4544-92FB-3377549FC3CF" + "criteria": "cpe:2.3:h:cisco:1100-4g_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0F77CD6A-83DA-4F31-A128-AD6DAECD623B" }, { "vulnerable": false, - "criteria": "cpe:2.3:h:cisco:isr1100-4gltegb:-:*:*:*:*:*:*:*", - "matchCriteriaId": "793ECE15-E2A0-4424-8BA0-98F580820844" + "criteria": "cpe:2.3:h:cisco:1100-4gltegb_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "62564BB8-1282-4597-A645-056298BE7CCB" }, { "vulnerable": false, - "criteria": "cpe:2.3:h:cisco:isr1100-4gltena:-:*:*:*:*:*:*:*", - "matchCriteriaId": "A45C786B-6D9F-4FCB-AB54-1E417723C415" + "criteria": "cpe:2.3:h:cisco:1100-4gltena_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "80E9CC47-3D7C-437A-85BE-4BB94C8AF1B8" }, { "vulnerable": false, - "criteria": "cpe:2.3:h:cisco:isr1100-6g:-:*:*:*:*:*:*:*", - "matchCriteriaId": "3105C8BD-62BC-4FE9-BE51-3B751FDDC202" + "criteria": "cpe:2.3:h:cisco:1100-6g_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2B68B363-3C57-4E95-8B13-0F9B59D551F7" }, { "vulnerable": false, diff --git a/CVE-2020/CVE-2020-32xx/CVE-2020-3266.json b/CVE-2020/CVE-2020-32xx/CVE-2020-3266.json index f22734ec352..a9c906a11d4 100644 --- a/CVE-2020/CVE-2020-32xx/CVE-2020-3266.json +++ b/CVE-2020/CVE-2020-32xx/CVE-2020-3266.json @@ -2,7 +2,7 @@ "id": "CVE-2020-3266", "sourceIdentifier": "ykramarz@cisco.com", "published": "2020-03-19T16:15:15.690", - "lastModified": "2020-03-23T18:47:47.613", + "lastModified": "2023-05-23T13:55:46.380", "vulnStatus": "Analyzed", "descriptions": [ { @@ -129,23 +129,23 @@ "cpeMatch": [ { "vulnerable": false, - "criteria": "cpe:2.3:h:cisco:isr1100-4g:-:*:*:*:*:*:*:*", - "matchCriteriaId": "30EAEC4D-A1F5-4544-92FB-3377549FC3CF" + "criteria": "cpe:2.3:h:cisco:1100-4g_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0F77CD6A-83DA-4F31-A128-AD6DAECD623B" }, { "vulnerable": false, - "criteria": "cpe:2.3:h:cisco:isr1100-4gltegb:-:*:*:*:*:*:*:*", - "matchCriteriaId": "793ECE15-E2A0-4424-8BA0-98F580820844" + "criteria": "cpe:2.3:h:cisco:1100-4gltegb_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "62564BB8-1282-4597-A645-056298BE7CCB" }, { "vulnerable": false, - "criteria": "cpe:2.3:h:cisco:isr1100-4gltena:-:*:*:*:*:*:*:*", - "matchCriteriaId": "A45C786B-6D9F-4FCB-AB54-1E417723C415" + "criteria": "cpe:2.3:h:cisco:1100-4gltena_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "80E9CC47-3D7C-437A-85BE-4BB94C8AF1B8" }, { "vulnerable": false, - "criteria": "cpe:2.3:h:cisco:isr1100-6g:-:*:*:*:*:*:*:*", - "matchCriteriaId": "3105C8BD-62BC-4FE9-BE51-3B751FDDC202" + "criteria": "cpe:2.3:h:cisco:1100-6g_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2B68B363-3C57-4E95-8B13-0F9B59D551F7" }, { "vulnerable": false, diff --git a/CVE-2020/CVE-2020-33xx/CVE-2020-3315.json b/CVE-2020/CVE-2020-33xx/CVE-2020-3315.json index ae8a1c20b13..9d40f2f299a 100644 --- a/CVE-2020/CVE-2020-33xx/CVE-2020-3315.json +++ b/CVE-2020/CVE-2020-33xx/CVE-2020-3315.json @@ -2,7 +2,7 @@ "id": "CVE-2020-3315", "sourceIdentifier": "ykramarz@cisco.com", "published": "2020-05-06T17:15:13.823", - "lastModified": "2023-05-22T18:57:24.750", + "lastModified": "2023-05-23T13:55:46.380", "vulnStatus": "Modified", "descriptions": [ { @@ -168,6 +168,21 @@ "operator": "OR", "negate": false, "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:1100-4g_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0F77CD6A-83DA-4F31-A128-AD6DAECD623B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:1100-6g_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2B68B363-3C57-4E95-8B13-0F9B59D551F7" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:1100-lte_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EBE4E146-1D77-4F15-AE58-3C1CE5DB62C5" + }, { "vulnerable": false, "criteria": "cpe:2.3:h:cisco:1101_integrated_services_router:-:*:*:*:*:*:*:*", @@ -232,21 +247,6 @@ "vulnerable": false, "criteria": "cpe:2.3:h:cisco:isa-3000-4c-k9:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D7A3FA6-CAAB-4F64-8EC8-B12FE45D8E22" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:cisco:isr1100-4g:-:*:*:*:*:*:*:*", - "matchCriteriaId": "30EAEC4D-A1F5-4544-92FB-3377549FC3CF" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:cisco:isr1100-6g:-:*:*:*:*:*:*:*", - "matchCriteriaId": "3105C8BD-62BC-4FE9-BE51-3B751FDDC202" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:cisco:isr1100-lte:-:*:*:*:*:*:*:*", - "matchCriteriaId": "10A27FD8-8301-40B9-BEA1-7AC3B623F275" } ] } diff --git a/CVE-2020/CVE-2020-33xx/CVE-2020-3372.json b/CVE-2020/CVE-2020-33xx/CVE-2020-3372.json index 6e0c4141ec9..0496a4fa319 100644 --- a/CVE-2020/CVE-2020-33xx/CVE-2020-3372.json +++ b/CVE-2020/CVE-2020-33xx/CVE-2020-3372.json @@ -2,7 +2,7 @@ "id": "CVE-2020-3372", "sourceIdentifier": "ykramarz@cisco.com", "published": "2020-07-16T18:15:18.487", - "lastModified": "2020-07-24T18:09:05.497", + "lastModified": "2023-05-23T13:55:46.380", "vulnStatus": "Analyzed", "descriptions": [ { @@ -136,23 +136,23 @@ "cpeMatch": [ { "vulnerable": false, - "criteria": "cpe:2.3:h:cisco:isr1100-4g:-:*:*:*:*:*:*:*", - "matchCriteriaId": "30EAEC4D-A1F5-4544-92FB-3377549FC3CF" + "criteria": "cpe:2.3:h:cisco:1100-4g_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0F77CD6A-83DA-4F31-A128-AD6DAECD623B" }, { "vulnerable": false, - "criteria": "cpe:2.3:h:cisco:isr1100-4gltegb:-:*:*:*:*:*:*:*", - "matchCriteriaId": "793ECE15-E2A0-4424-8BA0-98F580820844" + "criteria": "cpe:2.3:h:cisco:1100-4gltegb_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "62564BB8-1282-4597-A645-056298BE7CCB" }, { "vulnerable": false, - "criteria": "cpe:2.3:h:cisco:isr1100-4gltena:-:*:*:*:*:*:*:*", - "matchCriteriaId": "A45C786B-6D9F-4FCB-AB54-1E417723C415" + "criteria": "cpe:2.3:h:cisco:1100-4gltena_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "80E9CC47-3D7C-437A-85BE-4BB94C8AF1B8" }, { "vulnerable": false, - "criteria": "cpe:2.3:h:cisco:isr1100-6g:-:*:*:*:*:*:*:*", - "matchCriteriaId": "3105C8BD-62BC-4FE9-BE51-3B751FDDC202" + "criteria": "cpe:2.3:h:cisco:1100-6g_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2B68B363-3C57-4E95-8B13-0F9B59D551F7" }, { "vulnerable": false, diff --git a/CVE-2020/CVE-2020-33xx/CVE-2020-3378.json b/CVE-2020/CVE-2020-33xx/CVE-2020-3378.json index 5361c77e5eb..b01425c8c4b 100644 --- a/CVE-2020/CVE-2020-33xx/CVE-2020-3378.json +++ b/CVE-2020/CVE-2020-33xx/CVE-2020-3378.json @@ -2,7 +2,7 @@ "id": "CVE-2020-3378", "sourceIdentifier": "ykramarz@cisco.com", "published": "2020-07-16T18:15:18.597", - "lastModified": "2020-07-24T18:13:06.390", + "lastModified": "2023-05-23T13:55:46.380", "vulnStatus": "Analyzed", "descriptions": [ { @@ -136,23 +136,23 @@ "cpeMatch": [ { "vulnerable": false, - "criteria": "cpe:2.3:h:cisco:isr1100-4g:-:*:*:*:*:*:*:*", - "matchCriteriaId": "30EAEC4D-A1F5-4544-92FB-3377549FC3CF" + "criteria": "cpe:2.3:h:cisco:1100-4g_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0F77CD6A-83DA-4F31-A128-AD6DAECD623B" }, { "vulnerable": false, - "criteria": "cpe:2.3:h:cisco:isr1100-4gltegb:-:*:*:*:*:*:*:*", - "matchCriteriaId": "793ECE15-E2A0-4424-8BA0-98F580820844" + "criteria": "cpe:2.3:h:cisco:1100-4gltegb_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "62564BB8-1282-4597-A645-056298BE7CCB" }, { "vulnerable": false, - "criteria": "cpe:2.3:h:cisco:isr1100-4gltena:-:*:*:*:*:*:*:*", - "matchCriteriaId": "A45C786B-6D9F-4FCB-AB54-1E417723C415" + "criteria": "cpe:2.3:h:cisco:1100-4gltena_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "80E9CC47-3D7C-437A-85BE-4BB94C8AF1B8" }, { "vulnerable": false, - "criteria": "cpe:2.3:h:cisco:isr1100-6g:-:*:*:*:*:*:*:*", - "matchCriteriaId": "3105C8BD-62BC-4FE9-BE51-3B751FDDC202" + "criteria": "cpe:2.3:h:cisco:1100-6g_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2B68B363-3C57-4E95-8B13-0F9B59D551F7" }, { "vulnerable": false, diff --git a/CVE-2020/CVE-2020-33xx/CVE-2020-3381.json b/CVE-2020/CVE-2020-33xx/CVE-2020-3381.json index d359487a61c..1570ef4f53a 100644 --- a/CVE-2020/CVE-2020-33xx/CVE-2020-3381.json +++ b/CVE-2020/CVE-2020-33xx/CVE-2020-3381.json @@ -2,7 +2,7 @@ "id": "CVE-2020-3381", "sourceIdentifier": "ykramarz@cisco.com", "published": "2020-07-16T18:15:18.907", - "lastModified": "2020-07-23T16:20:41.607", + "lastModified": "2023-05-23T13:55:46.380", "vulnStatus": "Analyzed", "descriptions": [ { @@ -143,23 +143,23 @@ "cpeMatch": [ { "vulnerable": false, - "criteria": "cpe:2.3:h:cisco:isr1100-4g:-:*:*:*:*:*:*:*", - "matchCriteriaId": "30EAEC4D-A1F5-4544-92FB-3377549FC3CF" + "criteria": "cpe:2.3:h:cisco:1100-4g_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0F77CD6A-83DA-4F31-A128-AD6DAECD623B" }, { "vulnerable": false, - "criteria": "cpe:2.3:h:cisco:isr1100-4gltegb:-:*:*:*:*:*:*:*", - "matchCriteriaId": "793ECE15-E2A0-4424-8BA0-98F580820844" + "criteria": "cpe:2.3:h:cisco:1100-4gltegb_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "62564BB8-1282-4597-A645-056298BE7CCB" }, { "vulnerable": false, - "criteria": "cpe:2.3:h:cisco:isr1100-4gltena:-:*:*:*:*:*:*:*", - "matchCriteriaId": "A45C786B-6D9F-4FCB-AB54-1E417723C415" + "criteria": "cpe:2.3:h:cisco:1100-4gltena_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "80E9CC47-3D7C-437A-85BE-4BB94C8AF1B8" }, { "vulnerable": false, - "criteria": "cpe:2.3:h:cisco:isr1100-6g:-:*:*:*:*:*:*:*", - "matchCriteriaId": "3105C8BD-62BC-4FE9-BE51-3B751FDDC202" + "criteria": "cpe:2.3:h:cisco:1100-6g_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2B68B363-3C57-4E95-8B13-0F9B59D551F7" } ] } diff --git a/CVE-2020/CVE-2020-33xx/CVE-2020-3387.json b/CVE-2020/CVE-2020-33xx/CVE-2020-3387.json index dbe2c8d2068..6af0bafa076 100644 --- a/CVE-2020/CVE-2020-33xx/CVE-2020-3387.json +++ b/CVE-2020/CVE-2020-33xx/CVE-2020-3387.json @@ -2,7 +2,7 @@ "id": "CVE-2020-3387", "sourceIdentifier": "ykramarz@cisco.com", "published": "2020-07-16T18:15:19.127", - "lastModified": "2021-08-06T18:58:52.680", + "lastModified": "2023-05-23T13:55:46.380", "vulnStatus": "Analyzed", "descriptions": [ { @@ -143,23 +143,23 @@ "cpeMatch": [ { "vulnerable": false, - "criteria": "cpe:2.3:h:cisco:isr1100-4g:-:*:*:*:*:*:*:*", - "matchCriteriaId": "30EAEC4D-A1F5-4544-92FB-3377549FC3CF" + "criteria": "cpe:2.3:h:cisco:1100-4g_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0F77CD6A-83DA-4F31-A128-AD6DAECD623B" }, { "vulnerable": false, - "criteria": "cpe:2.3:h:cisco:isr1100-4gltegb:-:*:*:*:*:*:*:*", - "matchCriteriaId": "793ECE15-E2A0-4424-8BA0-98F580820844" + "criteria": "cpe:2.3:h:cisco:1100-4gltegb_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "62564BB8-1282-4597-A645-056298BE7CCB" }, { "vulnerable": false, - "criteria": "cpe:2.3:h:cisco:isr1100-4gltena:-:*:*:*:*:*:*:*", - "matchCriteriaId": "A45C786B-6D9F-4FCB-AB54-1E417723C415" + "criteria": "cpe:2.3:h:cisco:1100-4gltena_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "80E9CC47-3D7C-437A-85BE-4BB94C8AF1B8" }, { "vulnerable": false, - "criteria": "cpe:2.3:h:cisco:isr1100-6g:-:*:*:*:*:*:*:*", - "matchCriteriaId": "3105C8BD-62BC-4FE9-BE51-3B751FDDC202" + "criteria": "cpe:2.3:h:cisco:1100-6g_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2B68B363-3C57-4E95-8B13-0F9B59D551F7" } ] } diff --git a/CVE-2020/CVE-2020-33xx/CVE-2020-3388.json b/CVE-2020/CVE-2020-33xx/CVE-2020-3388.json index ae431535b30..5d97cf96984 100644 --- a/CVE-2020/CVE-2020-33xx/CVE-2020-3388.json +++ b/CVE-2020/CVE-2020-33xx/CVE-2020-3388.json @@ -2,7 +2,7 @@ "id": "CVE-2020-3388", "sourceIdentifier": "ykramarz@cisco.com", "published": "2020-07-16T18:15:19.220", - "lastModified": "2020-07-23T15:36:22.017", + "lastModified": "2023-05-23T13:55:46.380", "vulnStatus": "Analyzed", "descriptions": [ { @@ -143,23 +143,23 @@ "cpeMatch": [ { "vulnerable": false, - "criteria": "cpe:2.3:h:cisco:isr1100-4g:-:*:*:*:*:*:*:*", - "matchCriteriaId": "30EAEC4D-A1F5-4544-92FB-3377549FC3CF" + "criteria": "cpe:2.3:h:cisco:1100-4g_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0F77CD6A-83DA-4F31-A128-AD6DAECD623B" }, { "vulnerable": false, - "criteria": "cpe:2.3:h:cisco:isr1100-4gltegb:-:*:*:*:*:*:*:*", - "matchCriteriaId": "793ECE15-E2A0-4424-8BA0-98F580820844" + "criteria": "cpe:2.3:h:cisco:1100-4gltegb_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "62564BB8-1282-4597-A645-056298BE7CCB" }, { "vulnerable": false, - "criteria": "cpe:2.3:h:cisco:isr1100-4gltena:-:*:*:*:*:*:*:*", - "matchCriteriaId": "A45C786B-6D9F-4FCB-AB54-1E417723C415" + "criteria": "cpe:2.3:h:cisco:1100-4gltena_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "80E9CC47-3D7C-437A-85BE-4BB94C8AF1B8" }, { "vulnerable": false, - "criteria": "cpe:2.3:h:cisco:isr1100-6g:-:*:*:*:*:*:*:*", - "matchCriteriaId": "3105C8BD-62BC-4FE9-BE51-3B751FDDC202" + "criteria": "cpe:2.3:h:cisco:1100-6g_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2B68B363-3C57-4E95-8B13-0F9B59D551F7" } ] } diff --git a/CVE-2020/CVE-2020-33xx/CVE-2020-3393.json b/CVE-2020/CVE-2020-33xx/CVE-2020-3393.json index 3abd8e02cd5..b3b0013d059 100644 --- a/CVE-2020/CVE-2020-33xx/CVE-2020-3393.json +++ b/CVE-2020/CVE-2020-33xx/CVE-2020-3393.json @@ -2,7 +2,7 @@ "id": "CVE-2020-3393", "sourceIdentifier": "ykramarz@cisco.com", "published": "2020-09-24T18:15:17.587", - "lastModified": "2023-05-22T18:57:24.750", + "lastModified": "2023-05-23T13:55:46.380", "vulnStatus": "Analyzed", "descriptions": [ { @@ -126,16 +126,46 @@ "operator": "OR", "negate": false, "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:1100-4g_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0F77CD6A-83DA-4F31-A128-AD6DAECD623B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:1100-4gltegb_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "62564BB8-1282-4597-A645-056298BE7CCB" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:1100-4gltena_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "80E9CC47-3D7C-437A-85BE-4BB94C8AF1B8" + }, { "vulnerable": false, "criteria": "cpe:2.3:h:cisco:1100-4p_integrated_services_router:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2D2305B-B69E-4F74-A44E-07B3205CE9F7" }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:1100-6g_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2B68B363-3C57-4E95-8B13-0F9B59D551F7" + }, { "vulnerable": false, "criteria": "cpe:2.3:h:cisco:1100-8p_integrated_services_router:-:*:*:*:*:*:*:*", "matchCriteriaId": "26DD41B3-1D1D-44D3-BA8E-5A66AFEE77E6" }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:1100-lte_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EBE4E146-1D77-4F15-AE58-3C1CE5DB62C5" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:1100_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1952B64C-4AE0-4CCB-86C5-8D1FF6A12822" + }, { "vulnerable": false, "criteria": "cpe:2.3:h:cisco:1101-4p_integrated_services_router:-:*:*:*:*:*:*:*", @@ -561,36 +591,6 @@ "criteria": "cpe:2.3:h:cisco:csr_1000v:*:*:*:*:*:*:*:*", "matchCriteriaId": "A7A99113-21C8-4DC4-865B-BEE7401B7720" }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:cisco:isr1100:-:*:*:*:*:*:*:*", - "matchCriteriaId": "9CAAE9BA-E9E6-4D53-B3BB-EBB8231C547D" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:cisco:isr1100-4g:-:*:*:*:*:*:*:*", - "matchCriteriaId": "30EAEC4D-A1F5-4544-92FB-3377549FC3CF" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:cisco:isr1100-4gltegb:-:*:*:*:*:*:*:*", - "matchCriteriaId": "793ECE15-E2A0-4424-8BA0-98F580820844" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:cisco:isr1100-4gltena:-:*:*:*:*:*:*:*", - "matchCriteriaId": "A45C786B-6D9F-4FCB-AB54-1E417723C415" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:cisco:isr1100-6g:-:*:*:*:*:*:*:*", - "matchCriteriaId": "3105C8BD-62BC-4FE9-BE51-3B751FDDC202" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:cisco:isr1100-lte:-:*:*:*:*:*:*:*", - "matchCriteriaId": "10A27FD8-8301-40B9-BEA1-7AC3B623F275" - }, { "vulnerable": false, "criteria": "cpe:2.3:h:cisco:ws-c3650-12x48uq:-:*:*:*:*:*:*:*", diff --git a/CVE-2020/CVE-2020-33xx/CVE-2020-3396.json b/CVE-2020/CVE-2020-33xx/CVE-2020-3396.json index ad97a8dc5a2..6b4f3f3ad16 100644 --- a/CVE-2020/CVE-2020-33xx/CVE-2020-3396.json +++ b/CVE-2020/CVE-2020-33xx/CVE-2020-3396.json @@ -2,7 +2,7 @@ "id": "CVE-2020-3396", "sourceIdentifier": "ykramarz@cisco.com", "published": "2020-09-24T18:15:17.683", - "lastModified": "2020-10-15T18:05:10.117", + "lastModified": "2023-05-23T13:55:46.380", "vulnStatus": "Analyzed", "descriptions": [ { @@ -126,6 +126,81 @@ "operator": "OR", "negate": false, "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:1100-4g_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0F77CD6A-83DA-4F31-A128-AD6DAECD623B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:1100-4gltegb_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "62564BB8-1282-4597-A645-056298BE7CCB" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:1100-4gltena_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "80E9CC47-3D7C-437A-85BE-4BB94C8AF1B8" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:1100-6g_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2B68B363-3C57-4E95-8B13-0F9B59D551F7" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:1100-lte_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EBE4E146-1D77-4F15-AE58-3C1CE5DB62C5" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:1100_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1952B64C-4AE0-4CCB-86C5-8D1FF6A12822" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:4321\\/k9-rf_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "05C90C43-2D7D-43F8-AD7F-421878909AE2" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:4321\\/k9-ws_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "445597DA-7EEC-470D-9A71-BC43A9F7DE5E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:4321\\/k9_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "86049773-C88D-4A26-A0D3-D40F3C312AEC" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:4331\\/k9-rf_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6AB4B7C2-4D45-4267-BCBB-57D36C6104A3" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:4331\\/k9-ws_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3B8A4630-8B21-4994-8EF5-E105593A64E5" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:4331\\/k9_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F799DC02-EB06-458C-8545-A174475FE7A2" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:4351\\/k9-rf_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B89FBA68-A8ED-4C5A-916E-A68468F59730" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:4351\\/k9-ws_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CD272E6E-2ED1-4408-8FF7-0B82F9DCBEF8" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:4351\\/k9_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DC278B77-AD63-42AD-B9E8-EE4DE97E27E9" + }, { "vulnerable": false, "criteria": "cpe:2.3:h:cisco:asr_1000-x:-:*:*:*:*:*:*:*", @@ -325,81 +400,6 @@ "vulnerable": false, "criteria": "cpe:2.3:h:cisco:csr1000v:-:*:*:*:*:*:*:*", "matchCriteriaId": "62081293-8355-4197-A5A8-1E434B808680" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:cisco:isr1100:-:*:*:*:*:*:*:*", - "matchCriteriaId": "9CAAE9BA-E9E6-4D53-B3BB-EBB8231C547D" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:cisco:isr1100-4g:-:*:*:*:*:*:*:*", - "matchCriteriaId": "30EAEC4D-A1F5-4544-92FB-3377549FC3CF" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:cisco:isr1100-4gltegb:-:*:*:*:*:*:*:*", - "matchCriteriaId": "793ECE15-E2A0-4424-8BA0-98F580820844" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:cisco:isr1100-4gltena:-:*:*:*:*:*:*:*", - "matchCriteriaId": "A45C786B-6D9F-4FCB-AB54-1E417723C415" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:cisco:isr1100-6g:-:*:*:*:*:*:*:*", - "matchCriteriaId": "3105C8BD-62BC-4FE9-BE51-3B751FDDC202" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:cisco:isr1100-lte:-:*:*:*:*:*:*:*", - "matchCriteriaId": "10A27FD8-8301-40B9-BEA1-7AC3B623F275" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:cisco:isr4321\\/k9:-:*:*:*:*:*:*:*", - "matchCriteriaId": "CC2CD40F-62E2-456B-AFA0-C063D773181E" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:cisco:isr4321\\/k9-rf:-:*:*:*:*:*:*:*", - "matchCriteriaId": "7711CA49-0F3E-4B65-B9A1-039C9DF8149B" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:cisco:isr4321\\/k9-ws:-:*:*:*:*:*:*:*", - "matchCriteriaId": "48DF5DA1-9147-4EE6-9D32-F7926091C5A2" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:cisco:isr4331\\/k9:-:*:*:*:*:*:*:*", - "matchCriteriaId": "36C18F97-B0BA-47CC-BC27-7285EF5641AE" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:cisco:isr4331\\/k9-rf:-:*:*:*:*:*:*:*", - "matchCriteriaId": "C4AA2977-BDF7-4894-9CF8-AD65DAF931EA" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:cisco:isr4331\\/k9-ws:-:*:*:*:*:*:*:*", - "matchCriteriaId": "40816759-0BE1-4728-A13F-5501E3AF707C" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:cisco:isr4351\\/k9:-:*:*:*:*:*:*:*", - "matchCriteriaId": "9946FD4E-4579-4E06-9CDC-321A8820BC0C" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:cisco:isr4351\\/k9-rf:-:*:*:*:*:*:*:*", - "matchCriteriaId": "E7CB8BF7-588F-4505-BD5B-2DF8B27A722D" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:cisco:isr4351\\/k9-ws:-:*:*:*:*:*:*:*", - "matchCriteriaId": "4A8CD7F3-2A4E-4C79-A9CD-F37E63E94625" } ] } diff --git a/CVE-2020/CVE-2020-34xx/CVE-2020-3401.json b/CVE-2020/CVE-2020-34xx/CVE-2020-3401.json index 0ad5b0c1468..1286e900a09 100644 --- a/CVE-2020/CVE-2020-34xx/CVE-2020-3401.json +++ b/CVE-2020/CVE-2020-34xx/CVE-2020-3401.json @@ -2,7 +2,7 @@ "id": "CVE-2020-3401", "sourceIdentifier": "ykramarz@cisco.com", "published": "2020-07-16T18:15:19.300", - "lastModified": "2020-07-23T15:03:36.620", + "lastModified": "2023-05-23T13:55:46.380", "vulnStatus": "Analyzed", "descriptions": [ { @@ -129,23 +129,23 @@ "cpeMatch": [ { "vulnerable": false, - "criteria": "cpe:2.3:h:cisco:isr1100-4g:-:*:*:*:*:*:*:*", - "matchCriteriaId": "30EAEC4D-A1F5-4544-92FB-3377549FC3CF" + "criteria": "cpe:2.3:h:cisco:1100-4g_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0F77CD6A-83DA-4F31-A128-AD6DAECD623B" }, { "vulnerable": false, - "criteria": "cpe:2.3:h:cisco:isr1100-4gltegb:-:*:*:*:*:*:*:*", - "matchCriteriaId": "793ECE15-E2A0-4424-8BA0-98F580820844" + "criteria": "cpe:2.3:h:cisco:1100-4gltegb_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "62564BB8-1282-4597-A645-056298BE7CCB" }, { "vulnerable": false, - "criteria": "cpe:2.3:h:cisco:isr1100-4gltena:-:*:*:*:*:*:*:*", - "matchCriteriaId": "A45C786B-6D9F-4FCB-AB54-1E417723C415" + "criteria": "cpe:2.3:h:cisco:1100-4gltena_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "80E9CC47-3D7C-437A-85BE-4BB94C8AF1B8" }, { "vulnerable": false, - "criteria": "cpe:2.3:h:cisco:isr1100-6g:-:*:*:*:*:*:*:*", - "matchCriteriaId": "3105C8BD-62BC-4FE9-BE51-3B751FDDC202" + "criteria": "cpe:2.3:h:cisco:1100-6g_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2B68B363-3C57-4E95-8B13-0F9B59D551F7" }, { "vulnerable": false, diff --git a/CVE-2020/CVE-2020-34xx/CVE-2020-3404.json b/CVE-2020/CVE-2020-34xx/CVE-2020-3404.json index 567a3b2ad98..1c91b084edb 100644 --- a/CVE-2020/CVE-2020-34xx/CVE-2020-3404.json +++ b/CVE-2020/CVE-2020-34xx/CVE-2020-3404.json @@ -2,7 +2,7 @@ "id": "CVE-2020-3404", "sourceIdentifier": "ykramarz@cisco.com", "published": "2020-09-24T18:15:18.073", - "lastModified": "2023-05-22T18:57:24.750", + "lastModified": "2023-05-23T13:55:46.380", "vulnStatus": "Analyzed", "descriptions": [ { @@ -126,16 +126,46 @@ "operator": "OR", "negate": false, "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:1100-4g_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0F77CD6A-83DA-4F31-A128-AD6DAECD623B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:1100-4gltegb_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "62564BB8-1282-4597-A645-056298BE7CCB" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:1100-4gltena_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "80E9CC47-3D7C-437A-85BE-4BB94C8AF1B8" + }, { "vulnerable": false, "criteria": "cpe:2.3:h:cisco:1100-4p_integrated_services_router:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2D2305B-B69E-4F74-A44E-07B3205CE9F7" }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:1100-6g_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2B68B363-3C57-4E95-8B13-0F9B59D551F7" + }, { "vulnerable": false, "criteria": "cpe:2.3:h:cisco:1100-8p_integrated_services_router:-:*:*:*:*:*:*:*", "matchCriteriaId": "26DD41B3-1D1D-44D3-BA8E-5A66AFEE77E6" }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:1100-lte_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EBE4E146-1D77-4F15-AE58-3C1CE5DB62C5" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:1100_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1952B64C-4AE0-4CCB-86C5-8D1FF6A12822" + }, { "vulnerable": false, "criteria": "cpe:2.3:h:cisco:1101-4p_integrated_services_router:-:*:*:*:*:*:*:*", @@ -561,36 +591,6 @@ "criteria": "cpe:2.3:h:cisco:csr_1000v:*:*:*:*:*:*:*:*", "matchCriteriaId": "A7A99113-21C8-4DC4-865B-BEE7401B7720" }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:cisco:isr1100:-:*:*:*:*:*:*:*", - "matchCriteriaId": "9CAAE9BA-E9E6-4D53-B3BB-EBB8231C547D" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:cisco:isr1100-4g:-:*:*:*:*:*:*:*", - "matchCriteriaId": "30EAEC4D-A1F5-4544-92FB-3377549FC3CF" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:cisco:isr1100-4gltegb:-:*:*:*:*:*:*:*", - "matchCriteriaId": "793ECE15-E2A0-4424-8BA0-98F580820844" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:cisco:isr1100-4gltena:-:*:*:*:*:*:*:*", - "matchCriteriaId": "A45C786B-6D9F-4FCB-AB54-1E417723C415" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:cisco:isr1100-6g:-:*:*:*:*:*:*:*", - "matchCriteriaId": "3105C8BD-62BC-4FE9-BE51-3B751FDDC202" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:cisco:isr1100-lte:-:*:*:*:*:*:*:*", - "matchCriteriaId": "10A27FD8-8301-40B9-BEA1-7AC3B623F275" - }, { "vulnerable": false, "criteria": "cpe:2.3:h:cisco:ws-c3650-12x48uq:-:*:*:*:*:*:*:*", diff --git a/CVE-2020/CVE-2020-34xx/CVE-2020-3407.json b/CVE-2020/CVE-2020-34xx/CVE-2020-3407.json index 64bf73bdd76..2f26fae28ae 100644 --- a/CVE-2020/CVE-2020-34xx/CVE-2020-3407.json +++ b/CVE-2020/CVE-2020-34xx/CVE-2020-3407.json @@ -2,7 +2,7 @@ "id": "CVE-2020-3407", "sourceIdentifier": "ykramarz@cisco.com", "published": "2020-09-24T18:15:18.183", - "lastModified": "2023-05-22T18:57:24.750", + "lastModified": "2023-05-23T13:55:46.380", "vulnStatus": "Analyzed", "descriptions": [ { @@ -126,16 +126,46 @@ "operator": "OR", "negate": false, "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:1100-4g_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0F77CD6A-83DA-4F31-A128-AD6DAECD623B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:1100-4gltegb_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "62564BB8-1282-4597-A645-056298BE7CCB" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:1100-4gltena_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "80E9CC47-3D7C-437A-85BE-4BB94C8AF1B8" + }, { "vulnerable": false, "criteria": "cpe:2.3:h:cisco:1100-4p_integrated_services_router:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2D2305B-B69E-4F74-A44E-07B3205CE9F7" }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:1100-6g_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2B68B363-3C57-4E95-8B13-0F9B59D551F7" + }, { "vulnerable": false, "criteria": "cpe:2.3:h:cisco:1100-8p_integrated_services_router:-:*:*:*:*:*:*:*", "matchCriteriaId": "26DD41B3-1D1D-44D3-BA8E-5A66AFEE77E6" }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:1100-lte_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EBE4E146-1D77-4F15-AE58-3C1CE5DB62C5" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:1100_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1952B64C-4AE0-4CCB-86C5-8D1FF6A12822" + }, { "vulnerable": false, "criteria": "cpe:2.3:h:cisco:1101-4p_integrated_services_router:-:*:*:*:*:*:*:*", @@ -561,36 +591,6 @@ "criteria": "cpe:2.3:h:cisco:csr_1000v:*:*:*:*:*:*:*:*", "matchCriteriaId": "A7A99113-21C8-4DC4-865B-BEE7401B7720" }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:cisco:isr1100:-:*:*:*:*:*:*:*", - "matchCriteriaId": "9CAAE9BA-E9E6-4D53-B3BB-EBB8231C547D" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:cisco:isr1100-4g:-:*:*:*:*:*:*:*", - "matchCriteriaId": "30EAEC4D-A1F5-4544-92FB-3377549FC3CF" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:cisco:isr1100-4gltegb:-:*:*:*:*:*:*:*", - "matchCriteriaId": "793ECE15-E2A0-4424-8BA0-98F580820844" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:cisco:isr1100-4gltena:-:*:*:*:*:*:*:*", - "matchCriteriaId": "A45C786B-6D9F-4FCB-AB54-1E417723C415" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:cisco:isr1100-6g:-:*:*:*:*:*:*:*", - "matchCriteriaId": "3105C8BD-62BC-4FE9-BE51-3B751FDDC202" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:cisco:isr1100-lte:-:*:*:*:*:*:*:*", - "matchCriteriaId": "10A27FD8-8301-40B9-BEA1-7AC3B623F275" - }, { "vulnerable": false, "criteria": "cpe:2.3:h:cisco:ws-c3650-12x48uq:-:*:*:*:*:*:*:*", diff --git a/CVE-2020/CVE-2020-34xx/CVE-2020-3408.json b/CVE-2020/CVE-2020-34xx/CVE-2020-3408.json index 99046d39ffc..d247f26f8c6 100644 --- a/CVE-2020/CVE-2020-34xx/CVE-2020-3408.json +++ b/CVE-2020/CVE-2020-34xx/CVE-2020-3408.json @@ -2,7 +2,7 @@ "id": "CVE-2020-3408", "sourceIdentifier": "ykramarz@cisco.com", "published": "2020-09-24T18:15:18.260", - "lastModified": "2023-05-22T18:57:24.750", + "lastModified": "2023-05-23T13:55:46.380", "vulnStatus": "Analyzed", "descriptions": [ { @@ -131,16 +131,46 @@ "operator": "OR", "negate": false, "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:1100-4g_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0F77CD6A-83DA-4F31-A128-AD6DAECD623B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:1100-4gltegb_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "62564BB8-1282-4597-A645-056298BE7CCB" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:1100-4gltena_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "80E9CC47-3D7C-437A-85BE-4BB94C8AF1B8" + }, { "vulnerable": false, "criteria": "cpe:2.3:h:cisco:1100-4p_integrated_services_router:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2D2305B-B69E-4F74-A44E-07B3205CE9F7" }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:1100-6g_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2B68B363-3C57-4E95-8B13-0F9B59D551F7" + }, { "vulnerable": false, "criteria": "cpe:2.3:h:cisco:1100-8p_integrated_services_router:-:*:*:*:*:*:*:*", "matchCriteriaId": "26DD41B3-1D1D-44D3-BA8E-5A66AFEE77E6" }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:1100-lte_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EBE4E146-1D77-4F15-AE58-3C1CE5DB62C5" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:1100_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1952B64C-4AE0-4CCB-86C5-8D1FF6A12822" + }, { "vulnerable": false, "criteria": "cpe:2.3:h:cisco:1101-4p_integrated_services_router:-:*:*:*:*:*:*:*", @@ -566,36 +596,6 @@ "criteria": "cpe:2.3:h:cisco:csr_1000v:*:*:*:*:*:*:*:*", "matchCriteriaId": "A7A99113-21C8-4DC4-865B-BEE7401B7720" }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:cisco:isr1100:-:*:*:*:*:*:*:*", - "matchCriteriaId": "9CAAE9BA-E9E6-4D53-B3BB-EBB8231C547D" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:cisco:isr1100-4g:-:*:*:*:*:*:*:*", - "matchCriteriaId": "30EAEC4D-A1F5-4544-92FB-3377549FC3CF" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:cisco:isr1100-4gltegb:-:*:*:*:*:*:*:*", - "matchCriteriaId": "793ECE15-E2A0-4424-8BA0-98F580820844" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:cisco:isr1100-4gltena:-:*:*:*:*:*:*:*", - "matchCriteriaId": "A45C786B-6D9F-4FCB-AB54-1E417723C415" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:cisco:isr1100-6g:-:*:*:*:*:*:*:*", - "matchCriteriaId": "3105C8BD-62BC-4FE9-BE51-3B751FDDC202" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:cisco:isr1100-lte:-:*:*:*:*:*:*:*", - "matchCriteriaId": "10A27FD8-8301-40B9-BEA1-7AC3B623F275" - }, { "vulnerable": false, "criteria": "cpe:2.3:h:cisco:ws-c3650-12x48uq:-:*:*:*:*:*:*:*", diff --git a/CVE-2020/CVE-2020-35xx/CVE-2020-3503.json b/CVE-2020/CVE-2020-35xx/CVE-2020-3503.json index 2eed5849e95..c411984d24e 100644 --- a/CVE-2020/CVE-2020-35xx/CVE-2020-3503.json +++ b/CVE-2020/CVE-2020-35xx/CVE-2020-3503.json @@ -2,7 +2,7 @@ "id": "CVE-2020-3503", "sourceIdentifier": "ykramarz@cisco.com", "published": "2020-09-24T18:15:20.887", - "lastModified": "2023-05-22T18:57:24.750", + "lastModified": "2023-05-23T13:55:46.380", "vulnStatus": "Analyzed", "descriptions": [ { @@ -126,16 +126,46 @@ "operator": "OR", "negate": false, "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:1100-4g_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0F77CD6A-83DA-4F31-A128-AD6DAECD623B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:1100-4gltegb_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "62564BB8-1282-4597-A645-056298BE7CCB" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:1100-4gltena_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "80E9CC47-3D7C-437A-85BE-4BB94C8AF1B8" + }, { "vulnerable": false, "criteria": "cpe:2.3:h:cisco:1100-4p_integrated_services_router:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2D2305B-B69E-4F74-A44E-07B3205CE9F7" }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:1100-6g_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2B68B363-3C57-4E95-8B13-0F9B59D551F7" + }, { "vulnerable": false, "criteria": "cpe:2.3:h:cisco:1100-8p_integrated_services_router:-:*:*:*:*:*:*:*", "matchCriteriaId": "26DD41B3-1D1D-44D3-BA8E-5A66AFEE77E6" }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:1100-lte_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EBE4E146-1D77-4F15-AE58-3C1CE5DB62C5" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:1100_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1952B64C-4AE0-4CCB-86C5-8D1FF6A12822" + }, { "vulnerable": false, "criteria": "cpe:2.3:h:cisco:1101-4p_integrated_services_router:-:*:*:*:*:*:*:*", @@ -561,36 +591,6 @@ "criteria": "cpe:2.3:h:cisco:csr_1000v:*:*:*:*:*:*:*:*", "matchCriteriaId": "A7A99113-21C8-4DC4-865B-BEE7401B7720" }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:cisco:isr1100:-:*:*:*:*:*:*:*", - "matchCriteriaId": "9CAAE9BA-E9E6-4D53-B3BB-EBB8231C547D" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:cisco:isr1100-4g:-:*:*:*:*:*:*:*", - "matchCriteriaId": "30EAEC4D-A1F5-4544-92FB-3377549FC3CF" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:cisco:isr1100-4gltegb:-:*:*:*:*:*:*:*", - "matchCriteriaId": "793ECE15-E2A0-4424-8BA0-98F580820844" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:cisco:isr1100-4gltena:-:*:*:*:*:*:*:*", - "matchCriteriaId": "A45C786B-6D9F-4FCB-AB54-1E417723C415" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:cisco:isr1100-6g:-:*:*:*:*:*:*:*", - "matchCriteriaId": "3105C8BD-62BC-4FE9-BE51-3B751FDDC202" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:cisco:isr1100-lte:-:*:*:*:*:*:*:*", - "matchCriteriaId": "10A27FD8-8301-40B9-BEA1-7AC3B623F275" - }, { "vulnerable": false, "criteria": "cpe:2.3:h:cisco:ws-c3650-12x48uq:-:*:*:*:*:*:*:*", diff --git a/CVE-2020/CVE-2020-35xx/CVE-2020-3508.json b/CVE-2020/CVE-2020-35xx/CVE-2020-3508.json index a906575a713..6d3b4df69da 100644 --- a/CVE-2020/CVE-2020-35xx/CVE-2020-3508.json +++ b/CVE-2020/CVE-2020-35xx/CVE-2020-3508.json @@ -2,7 +2,7 @@ "id": "CVE-2020-3508", "sourceIdentifier": "ykramarz@cisco.com", "published": "2020-09-24T18:15:20.963", - "lastModified": "2023-05-22T18:57:24.750", + "lastModified": "2023-05-23T13:55:46.380", "vulnStatus": "Analyzed", "descriptions": [ { @@ -688,16 +688,46 @@ "operator": "OR", "negate": false, "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:1100-4g_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0F77CD6A-83DA-4F31-A128-AD6DAECD623B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:1100-4gltegb_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "62564BB8-1282-4597-A645-056298BE7CCB" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:1100-4gltena_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "80E9CC47-3D7C-437A-85BE-4BB94C8AF1B8" + }, { "vulnerable": false, "criteria": "cpe:2.3:h:cisco:1100-4p_integrated_services_router:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2D2305B-B69E-4F74-A44E-07B3205CE9F7" }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:1100-6g_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2B68B363-3C57-4E95-8B13-0F9B59D551F7" + }, { "vulnerable": false, "criteria": "cpe:2.3:h:cisco:1100-8p_integrated_services_router:-:*:*:*:*:*:*:*", "matchCriteriaId": "26DD41B3-1D1D-44D3-BA8E-5A66AFEE77E6" }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:1100-lte_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EBE4E146-1D77-4F15-AE58-3C1CE5DB62C5" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:1100_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1952B64C-4AE0-4CCB-86C5-8D1FF6A12822" + }, { "vulnerable": false, "criteria": "cpe:2.3:h:cisco:1101-4p_integrated_services_router:-:*:*:*:*:*:*:*", @@ -748,6 +778,51 @@ "criteria": "cpe:2.3:h:cisco:1160_integrated_services_router:-:*:*:*:*:*:*:*", "matchCriteriaId": "D916389F-54DB-44CB-91DD-7CE3C7059350" }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:4321\\/k9-rf_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "05C90C43-2D7D-43F8-AD7F-421878909AE2" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:4321\\/k9-ws_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "445597DA-7EEC-470D-9A71-BC43A9F7DE5E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:4321\\/k9_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "86049773-C88D-4A26-A0D3-D40F3C312AEC" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:4331\\/k9-rf_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6AB4B7C2-4D45-4267-BCBB-57D36C6104A3" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:4331\\/k9-ws_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3B8A4630-8B21-4994-8EF5-E105593A64E5" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:4331\\/k9_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F799DC02-EB06-458C-8545-A174475FE7A2" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:4351\\/k9-rf_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B89FBA68-A8ED-4C5A-916E-A68468F59730" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:4351\\/k9-ws_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CD272E6E-2ED1-4408-8FF7-0B82F9DCBEF8" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:4351\\/k9_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DC278B77-AD63-42AD-B9E8-EE4DE97E27E9" + }, { "vulnerable": false, "criteria": "cpe:2.3:h:cisco:4431_integrated_services_router:-:*:*:*:*:*:*:*", @@ -807,81 +882,6 @@ "vulnerable": false, "criteria": "cpe:2.3:h:cisco:csr1000v:-:*:*:*:*:*:*:*", "matchCriteriaId": "62081293-8355-4197-A5A8-1E434B808680" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:cisco:isr1100:-:*:*:*:*:*:*:*", - "matchCriteriaId": "9CAAE9BA-E9E6-4D53-B3BB-EBB8231C547D" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:cisco:isr1100-4g:-:*:*:*:*:*:*:*", - "matchCriteriaId": "30EAEC4D-A1F5-4544-92FB-3377549FC3CF" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:cisco:isr1100-4gltegb:-:*:*:*:*:*:*:*", - "matchCriteriaId": "793ECE15-E2A0-4424-8BA0-98F580820844" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:cisco:isr1100-4gltena:-:*:*:*:*:*:*:*", - "matchCriteriaId": "A45C786B-6D9F-4FCB-AB54-1E417723C415" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:cisco:isr1100-6g:-:*:*:*:*:*:*:*", - "matchCriteriaId": "3105C8BD-62BC-4FE9-BE51-3B751FDDC202" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:cisco:isr1100-lte:-:*:*:*:*:*:*:*", - "matchCriteriaId": "10A27FD8-8301-40B9-BEA1-7AC3B623F275" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:cisco:isr4321\\/k9:-:*:*:*:*:*:*:*", - "matchCriteriaId": "CC2CD40F-62E2-456B-AFA0-C063D773181E" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:cisco:isr4321\\/k9-rf:-:*:*:*:*:*:*:*", - "matchCriteriaId": "7711CA49-0F3E-4B65-B9A1-039C9DF8149B" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:cisco:isr4321\\/k9-ws:-:*:*:*:*:*:*:*", - "matchCriteriaId": "48DF5DA1-9147-4EE6-9D32-F7926091C5A2" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:cisco:isr4331\\/k9:-:*:*:*:*:*:*:*", - "matchCriteriaId": "36C18F97-B0BA-47CC-BC27-7285EF5641AE" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:cisco:isr4331\\/k9-rf:-:*:*:*:*:*:*:*", - "matchCriteriaId": "C4AA2977-BDF7-4894-9CF8-AD65DAF931EA" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:cisco:isr4331\\/k9-ws:-:*:*:*:*:*:*:*", - "matchCriteriaId": "40816759-0BE1-4728-A13F-5501E3AF707C" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:cisco:isr4351\\/k9:-:*:*:*:*:*:*:*", - "matchCriteriaId": "9946FD4E-4579-4E06-9CDC-321A8820BC0C" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:cisco:isr4351\\/k9-rf:-:*:*:*:*:*:*:*", - "matchCriteriaId": "E7CB8BF7-588F-4505-BD5B-2DF8B27A722D" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:cisco:isr4351\\/k9-ws:-:*:*:*:*:*:*:*", - "matchCriteriaId": "4A8CD7F3-2A4E-4C79-A9CD-F37E63E94625" } ] } diff --git a/CVE-2020/CVE-2020-35xx/CVE-2020-3511.json b/CVE-2020/CVE-2020-35xx/CVE-2020-3511.json index e5fabf6700e..822a54c7e27 100644 --- a/CVE-2020/CVE-2020-35xx/CVE-2020-3511.json +++ b/CVE-2020/CVE-2020-35xx/CVE-2020-3511.json @@ -2,7 +2,7 @@ "id": "CVE-2020-3511", "sourceIdentifier": "ykramarz@cisco.com", "published": "2020-09-24T18:15:21.230", - "lastModified": "2023-05-22T18:57:24.750", + "lastModified": "2023-05-23T13:55:46.380", "vulnStatus": "Analyzed", "descriptions": [ { @@ -126,16 +126,46 @@ "operator": "OR", "negate": false, "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:1100-4g_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0F77CD6A-83DA-4F31-A128-AD6DAECD623B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:1100-4gltegb_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "62564BB8-1282-4597-A645-056298BE7CCB" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:1100-4gltena_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "80E9CC47-3D7C-437A-85BE-4BB94C8AF1B8" + }, { "vulnerable": false, "criteria": "cpe:2.3:h:cisco:1100-4p_integrated_services_router:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2D2305B-B69E-4F74-A44E-07B3205CE9F7" }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:1100-6g_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2B68B363-3C57-4E95-8B13-0F9B59D551F7" + }, { "vulnerable": false, "criteria": "cpe:2.3:h:cisco:1100-8p_integrated_services_router:-:*:*:*:*:*:*:*", "matchCriteriaId": "26DD41B3-1D1D-44D3-BA8E-5A66AFEE77E6" }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:1100-lte_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EBE4E146-1D77-4F15-AE58-3C1CE5DB62C5" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:1100_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1952B64C-4AE0-4CCB-86C5-8D1FF6A12822" + }, { "vulnerable": false, "criteria": "cpe:2.3:h:cisco:1101-4p_integrated_services_router:-:*:*:*:*:*:*:*", @@ -191,6 +221,51 @@ "criteria": "cpe:2.3:h:cisco:422_integrated_services_router:-:*:*:*:*:*:*:*", "matchCriteriaId": "03A273EE-41C1-41E9-9002-46F83FC6533F" }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:4321\\/k9-rf_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "05C90C43-2D7D-43F8-AD7F-421878909AE2" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:4321\\/k9-ws_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "445597DA-7EEC-470D-9A71-BC43A9F7DE5E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:4321\\/k9_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "86049773-C88D-4A26-A0D3-D40F3C312AEC" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:4331\\/k9-rf_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6AB4B7C2-4D45-4267-BCBB-57D36C6104A3" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:4331\\/k9-ws_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3B8A4630-8B21-4994-8EF5-E105593A64E5" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:4331\\/k9_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F799DC02-EB06-458C-8545-A174475FE7A2" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:4351\\/k9-rf_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B89FBA68-A8ED-4C5A-916E-A68468F59730" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:4351\\/k9-ws_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CD272E6E-2ED1-4408-8FF7-0B82F9DCBEF8" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:4351\\/k9_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DC278B77-AD63-42AD-B9E8-EE4DE97E27E9" + }, { "vulnerable": false, "criteria": "cpe:2.3:h:cisco:4431_integrated_services_router:-:*:*:*:*:*:*:*", @@ -300,81 +375,6 @@ "vulnerable": false, "criteria": "cpe:2.3:h:cisco:csr1000v:-:*:*:*:*:*:*:*", "matchCriteriaId": "62081293-8355-4197-A5A8-1E434B808680" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:cisco:isr1100:-:*:*:*:*:*:*:*", - "matchCriteriaId": "9CAAE9BA-E9E6-4D53-B3BB-EBB8231C547D" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:cisco:isr1100-4g:-:*:*:*:*:*:*:*", - "matchCriteriaId": "30EAEC4D-A1F5-4544-92FB-3377549FC3CF" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:cisco:isr1100-4gltegb:-:*:*:*:*:*:*:*", - "matchCriteriaId": "793ECE15-E2A0-4424-8BA0-98F580820844" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:cisco:isr1100-4gltena:-:*:*:*:*:*:*:*", - "matchCriteriaId": "A45C786B-6D9F-4FCB-AB54-1E417723C415" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:cisco:isr1100-6g:-:*:*:*:*:*:*:*", - "matchCriteriaId": "3105C8BD-62BC-4FE9-BE51-3B751FDDC202" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:cisco:isr1100-lte:-:*:*:*:*:*:*:*", - "matchCriteriaId": "10A27FD8-8301-40B9-BEA1-7AC3B623F275" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:cisco:isr4321\\/k9:-:*:*:*:*:*:*:*", - "matchCriteriaId": "CC2CD40F-62E2-456B-AFA0-C063D773181E" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:cisco:isr4321\\/k9-rf:-:*:*:*:*:*:*:*", - "matchCriteriaId": "7711CA49-0F3E-4B65-B9A1-039C9DF8149B" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:cisco:isr4321\\/k9-ws:-:*:*:*:*:*:*:*", - "matchCriteriaId": "48DF5DA1-9147-4EE6-9D32-F7926091C5A2" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:cisco:isr4331\\/k9:-:*:*:*:*:*:*:*", - "matchCriteriaId": "36C18F97-B0BA-47CC-BC27-7285EF5641AE" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:cisco:isr4331\\/k9-rf:-:*:*:*:*:*:*:*", - "matchCriteriaId": "C4AA2977-BDF7-4894-9CF8-AD65DAF931EA" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:cisco:isr4331\\/k9-ws:-:*:*:*:*:*:*:*", - "matchCriteriaId": "40816759-0BE1-4728-A13F-5501E3AF707C" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:cisco:isr4351\\/k9:-:*:*:*:*:*:*:*", - "matchCriteriaId": "9946FD4E-4579-4E06-9CDC-321A8820BC0C" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:cisco:isr4351\\/k9-rf:-:*:*:*:*:*:*:*", - "matchCriteriaId": "E7CB8BF7-588F-4505-BD5B-2DF8B27A722D" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:cisco:isr4351\\/k9-ws:-:*:*:*:*:*:*:*", - "matchCriteriaId": "4A8CD7F3-2A4E-4C79-A9CD-F37E63E94625" } ] } diff --git a/CVE-2021/CVE-2021-347xx/CVE-2021-34723.json b/CVE-2021/CVE-2021-347xx/CVE-2021-34723.json index a39b475e7cf..8d9886253d8 100644 --- a/CVE-2021/CVE-2021-347xx/CVE-2021-34723.json +++ b/CVE-2021/CVE-2021-347xx/CVE-2021-34723.json @@ -2,7 +2,7 @@ "id": "CVE-2021-34723", "sourceIdentifier": "ykramarz@cisco.com", "published": "2021-09-23T03:15:18.427", - "lastModified": "2023-05-22T18:57:24.750", + "lastModified": "2023-05-23T13:55:46.380", "vulnStatus": "Analyzed", "descriptions": [ { @@ -237,33 +237,33 @@ "cpeMatch": [ { "vulnerable": false, - "criteria": "cpe:2.3:h:cisco:isr1100:-:*:*:*:*:*:*:*", - "matchCriteriaId": "9CAAE9BA-E9E6-4D53-B3BB-EBB8231C547D" + "criteria": "cpe:2.3:h:cisco:1100-4g_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0F77CD6A-83DA-4F31-A128-AD6DAECD623B" }, { "vulnerable": false, - "criteria": "cpe:2.3:h:cisco:isr1100-4g:-:*:*:*:*:*:*:*", - "matchCriteriaId": "30EAEC4D-A1F5-4544-92FB-3377549FC3CF" + "criteria": "cpe:2.3:h:cisco:1100-4gltegb_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "62564BB8-1282-4597-A645-056298BE7CCB" }, { "vulnerable": false, - "criteria": "cpe:2.3:h:cisco:isr1100-4gltegb:-:*:*:*:*:*:*:*", - "matchCriteriaId": "793ECE15-E2A0-4424-8BA0-98F580820844" + "criteria": "cpe:2.3:h:cisco:1100-4gltena_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "80E9CC47-3D7C-437A-85BE-4BB94C8AF1B8" }, { "vulnerable": false, - "criteria": "cpe:2.3:h:cisco:isr1100-4gltena:-:*:*:*:*:*:*:*", - "matchCriteriaId": "A45C786B-6D9F-4FCB-AB54-1E417723C415" + "criteria": "cpe:2.3:h:cisco:1100-6g_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2B68B363-3C57-4E95-8B13-0F9B59D551F7" }, { "vulnerable": false, - "criteria": "cpe:2.3:h:cisco:isr1100-6g:-:*:*:*:*:*:*:*", - "matchCriteriaId": "3105C8BD-62BC-4FE9-BE51-3B751FDDC202" + "criteria": "cpe:2.3:h:cisco:1100-lte_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EBE4E146-1D77-4F15-AE58-3C1CE5DB62C5" }, { "vulnerable": false, - "criteria": "cpe:2.3:h:cisco:isr1100-lte:-:*:*:*:*:*:*:*", - "matchCriteriaId": "10A27FD8-8301-40B9-BEA1-7AC3B623F275" + "criteria": "cpe:2.3:h:cisco:1100_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1952B64C-4AE0-4CCB-86C5-8D1FF6A12822" } ] } diff --git a/CVE-2022/CVE-2022-207xx/CVE-2022-20775.json b/CVE-2022/CVE-2022-207xx/CVE-2022-20775.json index 5af80a47981..5b2e40cd1b3 100644 --- a/CVE-2022/CVE-2022-207xx/CVE-2022-20775.json +++ b/CVE-2022/CVE-2022-207xx/CVE-2022-20775.json @@ -2,7 +2,7 @@ "id": "CVE-2022-20775", "sourceIdentifier": "ykramarz@cisco.com", "published": "2022-09-30T19:15:11.467", - "lastModified": "2023-05-22T18:57:24.750", + "lastModified": "2023-05-23T13:55:46.380", "vulnStatus": "Analyzed", "descriptions": [ { @@ -288,16 +288,61 @@ "criteria": "cpe:2.3:h:cisco:4221_integrated_services_router:-:*:*:*:*:*:*:*", "matchCriteriaId": "6C8AED7C-DDA3-4C29-BB95-6518C02C551A" }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:4321\\/k9-rf_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "05C90C43-2D7D-43F8-AD7F-421878909AE2" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:4321\\/k9-ws_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "445597DA-7EEC-470D-9A71-BC43A9F7DE5E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:4321\\/k9_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "86049773-C88D-4A26-A0D3-D40F3C312AEC" + }, { "vulnerable": false, "criteria": "cpe:2.3:h:cisco:4321_integrated_services_router:-:*:*:*:*:*:*:*", "matchCriteriaId": "9421DBEF-AE42-4234-B49F-FCC34B804D7F" }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:4331\\/k9-rf_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6AB4B7C2-4D45-4267-BCBB-57D36C6104A3" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:4331\\/k9-ws_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3B8A4630-8B21-4994-8EF5-E105593A64E5" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:4331\\/k9_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F799DC02-EB06-458C-8545-A174475FE7A2" + }, { "vulnerable": false, "criteria": "cpe:2.3:h:cisco:4331_integrated_services_router:-:*:*:*:*:*:*:*", "matchCriteriaId": "5419CB9F-241F-4431-914F-2659BE27BEA5" }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:4351\\/k9-rf_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B89FBA68-A8ED-4C5A-916E-A68468F59730" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:4351\\/k9-ws_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CD272E6E-2ED1-4408-8FF7-0B82F9DCBEF8" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:4351\\/k9_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DC278B77-AD63-42AD-B9E8-EE4DE97E27E9" + }, { "vulnerable": false, "criteria": "cpe:2.3:h:cisco:4351_integrated_services_router:-:*:*:*:*:*:*:*", @@ -532,51 +577,6 @@ "vulnerable": false, "criteria": "cpe:2.3:h:cisco:catalyst_8540msr:-:*:*:*:*:*:*:*", "matchCriteriaId": "0F403859-F034-4DD9-9CA5-708EADECB380" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:cisco:isr4321\\/k9:-:*:*:*:*:*:*:*", - "matchCriteriaId": "CC2CD40F-62E2-456B-AFA0-C063D773181E" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:cisco:isr4321\\/k9-rf:-:*:*:*:*:*:*:*", - "matchCriteriaId": "7711CA49-0F3E-4B65-B9A1-039C9DF8149B" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:cisco:isr4321\\/k9-ws:-:*:*:*:*:*:*:*", - "matchCriteriaId": "48DF5DA1-9147-4EE6-9D32-F7926091C5A2" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:cisco:isr4331\\/k9:-:*:*:*:*:*:*:*", - "matchCriteriaId": "36C18F97-B0BA-47CC-BC27-7285EF5641AE" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:cisco:isr4331\\/k9-rf:-:*:*:*:*:*:*:*", - "matchCriteriaId": "C4AA2977-BDF7-4894-9CF8-AD65DAF931EA" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:cisco:isr4331\\/k9-ws:-:*:*:*:*:*:*:*", - "matchCriteriaId": "40816759-0BE1-4728-A13F-5501E3AF707C" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:cisco:isr4351\\/k9:-:*:*:*:*:*:*:*", - "matchCriteriaId": "9946FD4E-4579-4E06-9CDC-321A8820BC0C" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:cisco:isr4351\\/k9-rf:-:*:*:*:*:*:*:*", - "matchCriteriaId": "E7CB8BF7-588F-4505-BD5B-2DF8B27A722D" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:cisco:isr4351\\/k9-ws:-:*:*:*:*:*:*:*", - "matchCriteriaId": "4A8CD7F3-2A4E-4C79-A9CD-F37E63E94625" } ] } diff --git a/CVE-2022/CVE-2022-208xx/CVE-2022-20818.json b/CVE-2022/CVE-2022-208xx/CVE-2022-20818.json index 3c911b4b88e..e2f39b0beca 100644 --- a/CVE-2022/CVE-2022-208xx/CVE-2022-20818.json +++ b/CVE-2022/CVE-2022-208xx/CVE-2022-20818.json @@ -2,7 +2,7 @@ "id": "CVE-2022-20818", "sourceIdentifier": "ykramarz@cisco.com", "published": "2022-09-30T19:15:11.867", - "lastModified": "2023-05-22T18:57:24.750", + "lastModified": "2023-05-23T13:55:46.380", "vulnStatus": "Analyzed", "descriptions": [ { @@ -236,16 +236,61 @@ "criteria": "cpe:2.3:h:cisco:4221_integrated_services_router:-:*:*:*:*:*:*:*", "matchCriteriaId": "6C8AED7C-DDA3-4C29-BB95-6518C02C551A" }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:4321\\/k9-rf_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "05C90C43-2D7D-43F8-AD7F-421878909AE2" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:4321\\/k9-ws_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "445597DA-7EEC-470D-9A71-BC43A9F7DE5E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:4321\\/k9_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "86049773-C88D-4A26-A0D3-D40F3C312AEC" + }, { "vulnerable": false, "criteria": "cpe:2.3:h:cisco:4321_integrated_services_router:-:*:*:*:*:*:*:*", "matchCriteriaId": "9421DBEF-AE42-4234-B49F-FCC34B804D7F" }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:4331\\/k9-rf_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6AB4B7C2-4D45-4267-BCBB-57D36C6104A3" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:4331\\/k9-ws_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3B8A4630-8B21-4994-8EF5-E105593A64E5" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:4331\\/k9_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F799DC02-EB06-458C-8545-A174475FE7A2" + }, { "vulnerable": false, "criteria": "cpe:2.3:h:cisco:4331_integrated_services_router:-:*:*:*:*:*:*:*", "matchCriteriaId": "5419CB9F-241F-4431-914F-2659BE27BEA5" }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:4351\\/k9-rf_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B89FBA68-A8ED-4C5A-916E-A68468F59730" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:4351\\/k9-ws_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CD272E6E-2ED1-4408-8FF7-0B82F9DCBEF8" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:4351\\/k9_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DC278B77-AD63-42AD-B9E8-EE4DE97E27E9" + }, { "vulnerable": false, "criteria": "cpe:2.3:h:cisco:4351_integrated_services_router:-:*:*:*:*:*:*:*", @@ -480,51 +525,6 @@ "vulnerable": false, "criteria": "cpe:2.3:h:cisco:catalyst_8540msr:-:*:*:*:*:*:*:*", "matchCriteriaId": "0F403859-F034-4DD9-9CA5-708EADECB380" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:cisco:isr4321\\/k9:-:*:*:*:*:*:*:*", - "matchCriteriaId": "CC2CD40F-62E2-456B-AFA0-C063D773181E" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:cisco:isr4321\\/k9-rf:-:*:*:*:*:*:*:*", - "matchCriteriaId": "7711CA49-0F3E-4B65-B9A1-039C9DF8149B" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:cisco:isr4321\\/k9-ws:-:*:*:*:*:*:*:*", - "matchCriteriaId": "48DF5DA1-9147-4EE6-9D32-F7926091C5A2" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:cisco:isr4331\\/k9:-:*:*:*:*:*:*:*", - "matchCriteriaId": "36C18F97-B0BA-47CC-BC27-7285EF5641AE" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:cisco:isr4331\\/k9-rf:-:*:*:*:*:*:*:*", - "matchCriteriaId": "C4AA2977-BDF7-4894-9CF8-AD65DAF931EA" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:cisco:isr4331\\/k9-ws:-:*:*:*:*:*:*:*", - "matchCriteriaId": "40816759-0BE1-4728-A13F-5501E3AF707C" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:cisco:isr4351\\/k9:-:*:*:*:*:*:*:*", - "matchCriteriaId": "9946FD4E-4579-4E06-9CDC-321A8820BC0C" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:cisco:isr4351\\/k9-rf:-:*:*:*:*:*:*:*", - "matchCriteriaId": "E7CB8BF7-588F-4505-BD5B-2DF8B27A722D" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:h:cisco:isr4351\\/k9-ws:-:*:*:*:*:*:*:*", - "matchCriteriaId": "4A8CD7F3-2A4E-4C79-A9CD-F37E63E94625" } ] } diff --git a/CVE-2022/CVE-2022-466xx/CVE-2022-46658.json b/CVE-2022/CVE-2022-466xx/CVE-2022-46658.json index 94102b0882e..7627559566a 100644 --- a/CVE-2022/CVE-2022-466xx/CVE-2022-46658.json +++ b/CVE-2022/CVE-2022-466xx/CVE-2022-46658.json @@ -2,8 +2,8 @@ "id": "CVE-2022-46658", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2023-05-22T23:15:09.270", - "lastModified": "2023-05-22T23:15:09.270", - "vulnStatus": "Received", + "lastModified": "2023-05-23T13:04:39.657", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-467xx/CVE-2022-46738.json b/CVE-2022/CVE-2022-467xx/CVE-2022-46738.json index 5578100c084..09caad3ad82 100644 --- a/CVE-2022/CVE-2022-467xx/CVE-2022-46738.json +++ b/CVE-2022/CVE-2022-467xx/CVE-2022-46738.json @@ -2,8 +2,8 @@ "id": "CVE-2022-46738", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2023-05-22T23:15:09.350", - "lastModified": "2023-05-22T23:15:09.350", - "vulnStatus": "Received", + "lastModified": "2023-05-23T13:04:39.657", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-473xx/CVE-2022-47311.json b/CVE-2022/CVE-2022-473xx/CVE-2022-47311.json index aa361f77338..59546280fc5 100644 --- a/CVE-2022/CVE-2022-473xx/CVE-2022-47311.json +++ b/CVE-2022/CVE-2022-473xx/CVE-2022-47311.json @@ -2,8 +2,8 @@ "id": "CVE-2022-47311", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2023-05-22T23:15:09.423", - "lastModified": "2023-05-22T23:15:09.423", - "vulnStatus": "Received", + "lastModified": "2023-05-23T13:04:39.657", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-473xx/CVE-2022-47320.json b/CVE-2022/CVE-2022-473xx/CVE-2022-47320.json index 3aa563471e5..eed530c4f0c 100644 --- a/CVE-2022/CVE-2022-473xx/CVE-2022-47320.json +++ b/CVE-2022/CVE-2022-473xx/CVE-2022-47320.json @@ -2,8 +2,8 @@ "id": "CVE-2022-47320", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2023-05-22T23:15:09.493", - "lastModified": "2023-05-22T23:15:09.493", - "vulnStatus": "Received", + "lastModified": "2023-05-23T13:04:39.657", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-49xx/CVE-2022-4945.json b/CVE-2022/CVE-2022-49xx/CVE-2022-4945.json index 1aac1f78559..b35f48237fb 100644 --- a/CVE-2022/CVE-2022-49xx/CVE-2022-4945.json +++ b/CVE-2022/CVE-2022-49xx/CVE-2022-4945.json @@ -2,8 +2,8 @@ "id": "CVE-2022-4945", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2023-05-22T22:15:09.870", - "lastModified": "2023-05-22T22:15:09.870", - "vulnStatus": "Received", + "lastModified": "2023-05-23T13:04:39.657", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-226xx/CVE-2023-22654.json b/CVE-2023/CVE-2023-226xx/CVE-2023-22654.json index e997b6230fb..f7903075482 100644 --- a/CVE-2023/CVE-2023-226xx/CVE-2023-22654.json +++ b/CVE-2023/CVE-2023-226xx/CVE-2023-22654.json @@ -2,8 +2,8 @@ "id": "CVE-2023-22654", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2023-05-23T02:15:09.173", - "lastModified": "2023-05-23T02:15:09.173", - "vulnStatus": "Received", + "lastModified": "2023-05-23T13:04:34.787", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-235xx/CVE-2023-23545.json b/CVE-2023/CVE-2023-235xx/CVE-2023-23545.json index a101f653a0b..6ab3686608d 100644 --- a/CVE-2023/CVE-2023-235xx/CVE-2023-23545.json +++ b/CVE-2023/CVE-2023-235xx/CVE-2023-23545.json @@ -2,8 +2,8 @@ "id": "CVE-2023-23545", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2023-05-23T02:15:09.230", - "lastModified": "2023-05-23T02:15:09.230", - "vulnStatus": "Received", + "lastModified": "2023-05-23T13:04:34.787", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-236xx/CVE-2023-23693.json b/CVE-2023/CVE-2023-236xx/CVE-2023-23693.json index b4454341534..646568975bf 100644 --- a/CVE-2023/CVE-2023-236xx/CVE-2023-23693.json +++ b/CVE-2023/CVE-2023-236xx/CVE-2023-23693.json @@ -2,8 +2,8 @@ "id": "CVE-2023-23693", "sourceIdentifier": "security_alert@emc.com", "published": "2023-05-23T07:15:10.163", - "lastModified": "2023-05-23T07:15:10.163", - "vulnStatus": "Received", + "lastModified": "2023-05-23T13:04:30.710", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-236xx/CVE-2023-23694.json b/CVE-2023/CVE-2023-236xx/CVE-2023-23694.json index 9f0441c6a7c..ccb3cbde237 100644 --- a/CVE-2023/CVE-2023-236xx/CVE-2023-23694.json +++ b/CVE-2023/CVE-2023-236xx/CVE-2023-23694.json @@ -2,8 +2,8 @@ "id": "CVE-2023-23694", "sourceIdentifier": "security_alert@emc.com", "published": "2023-05-23T07:15:10.317", - "lastModified": "2023-05-23T07:15:10.317", - "vulnStatus": "Received", + "lastModified": "2023-05-23T13:04:30.710", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-237xx/CVE-2023-23706.json b/CVE-2023/CVE-2023-237xx/CVE-2023-23706.json new file mode 100644 index 00000000000..3f698fe966b --- /dev/null +++ b/CVE-2023/CVE-2023-237xx/CVE-2023-23706.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-23706", + "sourceIdentifier": "audit@patchstack.com", + "published": "2023-05-23T13:15:09.410", + "lastModified": "2023-05-23T13:42:55.053", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in miniOrange WordPress Social Login and Register (Discord, Google, Twitter, LinkedIn) plugin <=\u00a07.5.14 versions." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/miniorange-login-openid/wordpress-wordpress-social-login-and-register-discord-google-twitter-linkedin-plugin-7-5-14-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-237xx/CVE-2023-23724.json b/CVE-2023/CVE-2023-237xx/CVE-2023-23724.json new file mode 100644 index 00000000000..7d219230e3b --- /dev/null +++ b/CVE-2023/CVE-2023-237xx/CVE-2023-23724.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-23724", + "sourceIdentifier": "audit@patchstack.com", + "published": "2023-05-23T13:15:09.487", + "lastModified": "2023-05-23T13:42:55.053", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in Winwar Media WP Email Capture plugin <=\u00a03.9.3 versions." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/wp-email-capture/wordpress-wordpress-email-marketing-plugin-wp-email-capture-plugin-3-9-3-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-24xx/CVE-2023-2483.json b/CVE-2023/CVE-2023-24xx/CVE-2023-2483.json new file mode 100644 index 00000000000..9c44846feb1 --- /dev/null +++ b/CVE-2023/CVE-2023-24xx/CVE-2023-2483.json @@ -0,0 +1,15 @@ +{ + "id": "CVE-2023-2483", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-05-23T13:15:09.783", + "lastModified": "2023-05-23T13:15:09.783", + "vulnStatus": "Rejected", + "descriptions": [ + { + "lang": "en", + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2023-33203. Reason: This candidate is a reservation duplicate of CVE-2023-33203. Notes: All CVE users should reference CVE-2023-33203 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage." + } + ], + "metrics": {}, + "references": [] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-251xx/CVE-2023-25183.json b/CVE-2023/CVE-2023-251xx/CVE-2023-25183.json index fb2e2eefb33..10150949adc 100644 --- a/CVE-2023/CVE-2023-251xx/CVE-2023-25183.json +++ b/CVE-2023/CVE-2023-251xx/CVE-2023-25183.json @@ -2,8 +2,8 @@ "id": "CVE-2023-25183", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2023-05-22T21:15:13.633", - "lastModified": "2023-05-22T21:15:13.633", - "vulnStatus": "Received", + "lastModified": "2023-05-23T13:04:39.657", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-254xx/CVE-2023-25440.json b/CVE-2023/CVE-2023-254xx/CVE-2023-25440.json index 474cbacafb4..033ee18cd78 100644 --- a/CVE-2023/CVE-2023-254xx/CVE-2023-25440.json +++ b/CVE-2023/CVE-2023-254xx/CVE-2023-25440.json @@ -2,8 +2,8 @@ "id": "CVE-2023-25440", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-23T01:15:09.727", - "lastModified": "2023-05-23T01:15:09.727", - "vulnStatus": "Received", + "lastModified": "2023-05-23T13:04:39.657", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-254xx/CVE-2023-25472.json b/CVE-2023/CVE-2023-254xx/CVE-2023-25472.json new file mode 100644 index 00000000000..410f3cc4085 --- /dev/null +++ b/CVE-2023/CVE-2023-254xx/CVE-2023-25472.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-25472", + "sourceIdentifier": "audit@patchstack.com", + "published": "2023-05-23T13:15:09.563", + "lastModified": "2023-05-23T13:42:55.053", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in Podlove Podlove Podcast Publisher plugin <=\u00a03.8.3 versions." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/podlove-podcasting-plugin-for-wordpress/wordpress-podlove-podcast-publisher-plugin-3-8-3-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-254xx/CVE-2023-25481.json b/CVE-2023/CVE-2023-254xx/CVE-2023-25481.json new file mode 100644 index 00000000000..651aa4d14c1 --- /dev/null +++ b/CVE-2023/CVE-2023-254xx/CVE-2023-25481.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-25481", + "sourceIdentifier": "audit@patchstack.com", + "published": "2023-05-23T13:15:09.637", + "lastModified": "2023-05-23T13:42:55.053", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in Podlove Podlove Subscribe button plugin <=\u00a01.3.7 versions." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/podlove-subscribe-button/wordpress-podlove-subscribe-button-plugin-1-3-7-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-257xx/CVE-2023-25707.json b/CVE-2023/CVE-2023-257xx/CVE-2023-25707.json new file mode 100644 index 00000000000..92d30a0c964 --- /dev/null +++ b/CVE-2023/CVE-2023-257xx/CVE-2023-25707.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-25707", + "sourceIdentifier": "audit@patchstack.com", + "published": "2023-05-23T13:15:09.707", + "lastModified": "2023-05-23T13:42:55.053", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in E4J s.R.L. VikBooking Hotel Booking Engine & PMS plugin <=\u00a01.5.12 versions." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/vikbooking/wordpress-vikbooking-hotel-booking-engine-pms-plugin-1-5-12-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-259xx/CVE-2023-25946.json b/CVE-2023/CVE-2023-259xx/CVE-2023-25946.json index 005b915bafb..9b519b0212e 100644 --- a/CVE-2023/CVE-2023-259xx/CVE-2023-25946.json +++ b/CVE-2023/CVE-2023-259xx/CVE-2023-25946.json @@ -2,8 +2,8 @@ "id": "CVE-2023-25946", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2023-05-23T02:15:09.273", - "lastModified": "2023-05-23T02:15:09.273", - "vulnStatus": "Received", + "lastModified": "2023-05-23T13:04:34.787", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-259xx/CVE-2023-25953.json b/CVE-2023/CVE-2023-259xx/CVE-2023-25953.json index b2c88d64bc3..d5975f544bf 100644 --- a/CVE-2023/CVE-2023-259xx/CVE-2023-25953.json +++ b/CVE-2023/CVE-2023-259xx/CVE-2023-25953.json @@ -2,8 +2,8 @@ "id": "CVE-2023-25953", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2023-05-23T02:15:09.317", - "lastModified": "2023-05-23T02:15:09.317", - "vulnStatus": "Received", + "lastModified": "2023-05-23T13:04:34.787", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-25xx/CVE-2023-2504.json b/CVE-2023/CVE-2023-25xx/CVE-2023-2504.json index cb1e45dd076..3d37083df7c 100644 --- a/CVE-2023/CVE-2023-25xx/CVE-2023-2504.json +++ b/CVE-2023/CVE-2023-25xx/CVE-2023-2504.json @@ -2,8 +2,8 @@ "id": "CVE-2023-2504", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2023-05-22T22:15:10.277", - "lastModified": "2023-05-22T22:15:10.277", - "vulnStatus": "Received", + "lastModified": "2023-05-23T13:04:39.657", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-25xx/CVE-2023-2505.json b/CVE-2023/CVE-2023-25xx/CVE-2023-2505.json index 163eb136b56..a072d2f741d 100644 --- a/CVE-2023/CVE-2023-25xx/CVE-2023-2505.json +++ b/CVE-2023/CVE-2023-25xx/CVE-2023-2505.json @@ -2,8 +2,8 @@ "id": "CVE-2023-2505", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2023-05-22T22:15:10.350", - "lastModified": "2023-05-22T22:15:10.350", - "vulnStatus": "Received", + "lastModified": "2023-05-23T13:04:39.657", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-265xx/CVE-2023-26595.json b/CVE-2023/CVE-2023-265xx/CVE-2023-26595.json index bf685e8faa4..da1ff27acd3 100644 --- a/CVE-2023/CVE-2023-265xx/CVE-2023-26595.json +++ b/CVE-2023/CVE-2023-265xx/CVE-2023-26595.json @@ -2,8 +2,8 @@ "id": "CVE-2023-26595", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2023-05-23T02:15:09.353", - "lastModified": "2023-05-23T02:15:09.353", - "vulnStatus": "Received", + "lastModified": "2023-05-23T13:04:34.787", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-270xx/CVE-2023-27066.json b/CVE-2023/CVE-2023-270xx/CVE-2023-27066.json index 5c967849660..ab0958545f9 100644 --- a/CVE-2023/CVE-2023-270xx/CVE-2023-27066.json +++ b/CVE-2023/CVE-2023-270xx/CVE-2023-27066.json @@ -2,8 +2,8 @@ "id": "CVE-2023-27066", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-22T17:15:09.347", - "lastModified": "2023-05-22T17:15:09.347", - "vulnStatus": "Received", + "lastModified": "2023-05-23T13:04:43.693", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-270xx/CVE-2023-27067.json b/CVE-2023/CVE-2023-270xx/CVE-2023-27067.json index 574f0736c0e..086228ad173 100644 --- a/CVE-2023/CVE-2023-270xx/CVE-2023-27067.json +++ b/CVE-2023/CVE-2023-270xx/CVE-2023-27067.json @@ -2,8 +2,8 @@ "id": "CVE-2023-27067", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-22T19:15:09.960", - "lastModified": "2023-05-22T19:15:09.960", - "vulnStatus": "Received", + "lastModified": "2023-05-23T13:04:43.693", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-270xx/CVE-2023-27068.json b/CVE-2023/CVE-2023-270xx/CVE-2023-27068.json index c723e9d0bba..77d5108404d 100644 --- a/CVE-2023/CVE-2023-270xx/CVE-2023-27068.json +++ b/CVE-2023/CVE-2023-270xx/CVE-2023-27068.json @@ -2,8 +2,8 @@ "id": "CVE-2023-27068", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-23T01:15:09.773", - "lastModified": "2023-05-23T01:15:09.773", - "vulnStatus": "Received", + "lastModified": "2023-05-23T13:04:39.657", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-273xx/CVE-2023-27304.json b/CVE-2023/CVE-2023-273xx/CVE-2023-27304.json index 1b6c48fab05..51cca742eec 100644 --- a/CVE-2023/CVE-2023-273xx/CVE-2023-27304.json +++ b/CVE-2023/CVE-2023-273xx/CVE-2023-27304.json @@ -2,8 +2,8 @@ "id": "CVE-2023-27304", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2023-05-23T02:15:09.397", - "lastModified": "2023-05-23T02:15:09.397", - "vulnStatus": "Received", + "lastModified": "2023-05-23T13:04:34.787", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-273xx/CVE-2023-27384.json b/CVE-2023/CVE-2023-273xx/CVE-2023-27384.json index a82493212bb..d59842456a3 100644 --- a/CVE-2023/CVE-2023-273xx/CVE-2023-27384.json +++ b/CVE-2023/CVE-2023-273xx/CVE-2023-27384.json @@ -2,8 +2,8 @@ "id": "CVE-2023-27384", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2023-05-23T02:15:09.437", - "lastModified": "2023-05-23T02:15:09.437", - "vulnStatus": "Received", + "lastModified": "2023-05-23T13:04:34.787", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-273xx/CVE-2023-27387.json b/CVE-2023/CVE-2023-273xx/CVE-2023-27387.json index 7429987354a..ecd38ab7212 100644 --- a/CVE-2023/CVE-2023-273xx/CVE-2023-27387.json +++ b/CVE-2023/CVE-2023-273xx/CVE-2023-27387.json @@ -2,8 +2,8 @@ "id": "CVE-2023-27387", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2023-05-23T02:15:09.480", - "lastModified": "2023-05-23T02:15:09.480", - "vulnStatus": "Received", + "lastModified": "2023-05-23T13:04:34.787", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-273xx/CVE-2023-27388.json b/CVE-2023/CVE-2023-273xx/CVE-2023-27388.json index 85f519ccdff..ae1d4b61427 100644 --- a/CVE-2023/CVE-2023-273xx/CVE-2023-27388.json +++ b/CVE-2023/CVE-2023-273xx/CVE-2023-27388.json @@ -2,8 +2,8 @@ "id": "CVE-2023-27388", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2023-05-23T02:15:09.527", - "lastModified": "2023-05-23T02:15:09.527", - "vulnStatus": "Received", + "lastModified": "2023-05-23T13:04:34.787", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-273xx/CVE-2023-27397.json b/CVE-2023/CVE-2023-273xx/CVE-2023-27397.json index a78a1ed7d2d..0e833b7a601 100644 --- a/CVE-2023/CVE-2023-273xx/CVE-2023-27397.json +++ b/CVE-2023/CVE-2023-273xx/CVE-2023-27397.json @@ -2,8 +2,8 @@ "id": "CVE-2023-27397", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2023-05-23T02:15:09.570", - "lastModified": "2023-05-23T02:15:09.570", - "vulnStatus": "Received", + "lastModified": "2023-05-23T13:04:34.787", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-275xx/CVE-2023-27507.json b/CVE-2023/CVE-2023-275xx/CVE-2023-27507.json index 420bf5b6b22..62c02275438 100644 --- a/CVE-2023/CVE-2023-275xx/CVE-2023-27507.json +++ b/CVE-2023/CVE-2023-275xx/CVE-2023-27507.json @@ -2,8 +2,8 @@ "id": "CVE-2023-27507", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2023-05-23T02:15:09.610", - "lastModified": "2023-05-23T02:15:09.610", - "vulnStatus": "Received", + "lastModified": "2023-05-23T13:04:34.787", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-275xx/CVE-2023-27512.json b/CVE-2023/CVE-2023-275xx/CVE-2023-27512.json index 8057d78739f..39f3a7288bf 100644 --- a/CVE-2023/CVE-2023-275xx/CVE-2023-27512.json +++ b/CVE-2023/CVE-2023-275xx/CVE-2023-27512.json @@ -2,8 +2,8 @@ "id": "CVE-2023-27512", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2023-05-23T02:15:09.653", - "lastModified": "2023-05-23T02:15:09.653", - "vulnStatus": "Received", + "lastModified": "2023-05-23T13:04:34.787", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-275xx/CVE-2023-27514.json b/CVE-2023/CVE-2023-275xx/CVE-2023-27514.json index 9c586e3a73c..6e4196779f0 100644 --- a/CVE-2023/CVE-2023-275xx/CVE-2023-27514.json +++ b/CVE-2023/CVE-2023-275xx/CVE-2023-27514.json @@ -2,8 +2,8 @@ "id": "CVE-2023-27514", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2023-05-23T02:15:09.700", - "lastModified": "2023-05-23T02:15:09.700", - "vulnStatus": "Received", + "lastModified": "2023-05-23T13:04:34.787", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-275xx/CVE-2023-27518.json b/CVE-2023/CVE-2023-275xx/CVE-2023-27518.json index 95f14ee7b0b..9b2dfa1589e 100644 --- a/CVE-2023/CVE-2023-275xx/CVE-2023-27518.json +++ b/CVE-2023/CVE-2023-275xx/CVE-2023-27518.json @@ -2,8 +2,8 @@ "id": "CVE-2023-27518", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2023-05-23T02:15:09.743", - "lastModified": "2023-05-23T02:15:09.743", - "vulnStatus": "Received", + "lastModified": "2023-05-23T13:04:34.787", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-275xx/CVE-2023-27521.json b/CVE-2023/CVE-2023-275xx/CVE-2023-27521.json index 641a0814796..c4b0196aea9 100644 --- a/CVE-2023/CVE-2023-275xx/CVE-2023-27521.json +++ b/CVE-2023/CVE-2023-275xx/CVE-2023-27521.json @@ -2,8 +2,8 @@ "id": "CVE-2023-27521", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2023-05-23T02:15:09.787", - "lastModified": "2023-05-23T02:15:09.787", - "vulnStatus": "Received", + "lastModified": "2023-05-23T13:04:30.710", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-279xx/CVE-2023-27920.json b/CVE-2023/CVE-2023-279xx/CVE-2023-27920.json index d00ecdecaf0..847ec71c1a3 100644 --- a/CVE-2023/CVE-2023-279xx/CVE-2023-27920.json +++ b/CVE-2023/CVE-2023-279xx/CVE-2023-27920.json @@ -2,8 +2,8 @@ "id": "CVE-2023-27920", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2023-05-23T02:15:09.827", - "lastModified": "2023-05-23T02:15:09.827", - "vulnStatus": "Received", + "lastModified": "2023-05-23T13:04:30.710", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-279xx/CVE-2023-27921.json b/CVE-2023/CVE-2023-279xx/CVE-2023-27921.json index a4310effb9e..8e034075245 100644 --- a/CVE-2023/CVE-2023-279xx/CVE-2023-27921.json +++ b/CVE-2023/CVE-2023-279xx/CVE-2023-27921.json @@ -2,8 +2,8 @@ "id": "CVE-2023-27921", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2023-05-23T02:15:09.867", - "lastModified": "2023-05-23T02:15:09.867", - "vulnStatus": "Received", + "lastModified": "2023-05-23T13:04:30.710", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-279xx/CVE-2023-27922.json b/CVE-2023/CVE-2023-279xx/CVE-2023-27922.json index 4712668fb6b..3a5c3512afa 100644 --- a/CVE-2023/CVE-2023-279xx/CVE-2023-27922.json +++ b/CVE-2023/CVE-2023-279xx/CVE-2023-27922.json @@ -2,8 +2,8 @@ "id": "CVE-2023-27922", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2023-05-23T02:15:09.907", - "lastModified": "2023-05-23T02:15:09.907", - "vulnStatus": "Received", + "lastModified": "2023-05-23T13:04:30.710", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-279xx/CVE-2023-27923.json b/CVE-2023/CVE-2023-279xx/CVE-2023-27923.json index f05176c75f2..026821ff395 100644 --- a/CVE-2023/CVE-2023-279xx/CVE-2023-27923.json +++ b/CVE-2023/CVE-2023-279xx/CVE-2023-27923.json @@ -2,8 +2,8 @@ "id": "CVE-2023-27923", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2023-05-23T02:15:09.943", - "lastModified": "2023-05-23T02:15:09.943", - "vulnStatus": "Received", + "lastModified": "2023-05-23T13:04:30.710", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-279xx/CVE-2023-27925.json b/CVE-2023/CVE-2023-279xx/CVE-2023-27925.json index 11ef88e853e..ccf7a6a20a6 100644 --- a/CVE-2023/CVE-2023-279xx/CVE-2023-27925.json +++ b/CVE-2023/CVE-2023-279xx/CVE-2023-27925.json @@ -2,8 +2,8 @@ "id": "CVE-2023-27925", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2023-05-23T02:15:09.983", - "lastModified": "2023-05-23T02:15:09.983", - "vulnStatus": "Received", + "lastModified": "2023-05-23T13:04:30.710", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-279xx/CVE-2023-27926.json b/CVE-2023/CVE-2023-279xx/CVE-2023-27926.json index 120203c740e..26a69970653 100644 --- a/CVE-2023/CVE-2023-279xx/CVE-2023-27926.json +++ b/CVE-2023/CVE-2023-279xx/CVE-2023-27926.json @@ -2,8 +2,8 @@ "id": "CVE-2023-27926", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2023-05-23T02:15:10.023", - "lastModified": "2023-05-23T02:15:10.023", - "vulnStatus": "Received", + "lastModified": "2023-05-23T13:04:30.710", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-283xx/CVE-2023-28367.json b/CVE-2023/CVE-2023-283xx/CVE-2023-28367.json index d3d045f8947..12271149b6d 100644 --- a/CVE-2023/CVE-2023-283xx/CVE-2023-28367.json +++ b/CVE-2023/CVE-2023-283xx/CVE-2023-28367.json @@ -2,8 +2,8 @@ "id": "CVE-2023-28367", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2023-05-23T02:15:10.067", - "lastModified": "2023-05-23T02:15:10.067", - "vulnStatus": "Received", + "lastModified": "2023-05-23T13:04:30.710", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-283xx/CVE-2023-28386.json b/CVE-2023/CVE-2023-283xx/CVE-2023-28386.json index 822aa3683c2..72d0dedd333 100644 --- a/CVE-2023/CVE-2023-283xx/CVE-2023-28386.json +++ b/CVE-2023/CVE-2023-283xx/CVE-2023-28386.json @@ -2,8 +2,8 @@ "id": "CVE-2023-28386", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2023-05-22T20:15:10.250", - "lastModified": "2023-05-22T20:15:10.250", - "vulnStatus": "Received", + "lastModified": "2023-05-23T13:04:43.693", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-283xx/CVE-2023-28390.json b/CVE-2023/CVE-2023-283xx/CVE-2023-28390.json index 7f29f0b207f..1f9db0eae31 100644 --- a/CVE-2023/CVE-2023-283xx/CVE-2023-28390.json +++ b/CVE-2023/CVE-2023-283xx/CVE-2023-28390.json @@ -2,8 +2,8 @@ "id": "CVE-2023-28390", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2023-05-23T02:15:10.107", - "lastModified": "2023-05-23T02:15:10.107", - "vulnStatus": "Received", + "lastModified": "2023-05-23T13:04:30.710", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-283xx/CVE-2023-28392.json b/CVE-2023/CVE-2023-283xx/CVE-2023-28392.json index 437fa650eca..18a57339e8a 100644 --- a/CVE-2023/CVE-2023-283xx/CVE-2023-28392.json +++ b/CVE-2023/CVE-2023-283xx/CVE-2023-28392.json @@ -2,8 +2,8 @@ "id": "CVE-2023-28392", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2023-05-23T02:15:10.140", - "lastModified": "2023-05-23T02:15:10.140", - "vulnStatus": "Received", + "lastModified": "2023-05-23T13:04:30.710", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-283xx/CVE-2023-28394.json b/CVE-2023/CVE-2023-283xx/CVE-2023-28394.json index 2c90ab1598e..6cf8a4180eb 100644 --- a/CVE-2023/CVE-2023-283xx/CVE-2023-28394.json +++ b/CVE-2023/CVE-2023-283xx/CVE-2023-28394.json @@ -2,8 +2,8 @@ "id": "CVE-2023-28394", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2023-05-23T02:15:10.180", - "lastModified": "2023-05-23T02:15:10.180", - "vulnStatus": "Received", + "lastModified": "2023-05-23T13:04:30.710", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-284xx/CVE-2023-28408.json b/CVE-2023/CVE-2023-284xx/CVE-2023-28408.json index 1215363b28f..4bbd8182d78 100644 --- a/CVE-2023/CVE-2023-284xx/CVE-2023-28408.json +++ b/CVE-2023/CVE-2023-284xx/CVE-2023-28408.json @@ -2,8 +2,8 @@ "id": "CVE-2023-28408", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2023-05-23T02:15:10.220", - "lastModified": "2023-05-23T02:15:10.220", - "vulnStatus": "Received", + "lastModified": "2023-05-23T13:04:30.710", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-284xx/CVE-2023-28409.json b/CVE-2023/CVE-2023-284xx/CVE-2023-28409.json index 4be5f65bf3d..7ac30540f36 100644 --- a/CVE-2023/CVE-2023-284xx/CVE-2023-28409.json +++ b/CVE-2023/CVE-2023-284xx/CVE-2023-28409.json @@ -2,8 +2,8 @@ "id": "CVE-2023-28409", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2023-05-23T02:15:10.257", - "lastModified": "2023-05-23T02:15:10.257", - "vulnStatus": "Received", + "lastModified": "2023-05-23T13:04:30.710", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-284xx/CVE-2023-28412.json b/CVE-2023/CVE-2023-284xx/CVE-2023-28412.json index eeb2a70463a..fc110486199 100644 --- a/CVE-2023/CVE-2023-284xx/CVE-2023-28412.json +++ b/CVE-2023/CVE-2023-284xx/CVE-2023-28412.json @@ -2,8 +2,8 @@ "id": "CVE-2023-28412", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2023-05-22T20:15:10.330", - "lastModified": "2023-05-22T20:15:10.330", - "vulnStatus": "Received", + "lastModified": "2023-05-23T13:04:43.693", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-284xx/CVE-2023-28413.json b/CVE-2023/CVE-2023-284xx/CVE-2023-28413.json index 93e8c4ab90f..01860c208c5 100644 --- a/CVE-2023/CVE-2023-284xx/CVE-2023-28413.json +++ b/CVE-2023/CVE-2023-284xx/CVE-2023-28413.json @@ -2,8 +2,8 @@ "id": "CVE-2023-28413", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2023-05-23T02:15:10.293", - "lastModified": "2023-05-23T02:15:10.293", - "vulnStatus": "Received", + "lastModified": "2023-05-23T13:04:30.710", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-284xx/CVE-2023-28467.json b/CVE-2023/CVE-2023-284xx/CVE-2023-28467.json index a18234b6596..a3836e11dac 100644 --- a/CVE-2023/CVE-2023-284xx/CVE-2023-28467.json +++ b/CVE-2023/CVE-2023-284xx/CVE-2023-28467.json @@ -2,8 +2,8 @@ "id": "CVE-2023-28467", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-22T19:15:10.017", - "lastModified": "2023-05-22T19:15:10.017", - "vulnStatus": "Received", + "lastModified": "2023-05-23T13:04:43.693", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-286xx/CVE-2023-28649.json b/CVE-2023/CVE-2023-286xx/CVE-2023-28649.json index 1ffd06be408..23ebcd54588 100644 --- a/CVE-2023/CVE-2023-286xx/CVE-2023-28649.json +++ b/CVE-2023/CVE-2023-286xx/CVE-2023-28649.json @@ -2,8 +2,8 @@ "id": "CVE-2023-28649", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2023-05-22T20:15:10.417", - "lastModified": "2023-05-22T20:15:10.417", - "vulnStatus": "Received", + "lastModified": "2023-05-23T13:04:43.693", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-28xx/CVE-2023-2837.json b/CVE-2023/CVE-2023-28xx/CVE-2023-2837.json index 234b7c586c7..6900b9bc93d 100644 --- a/CVE-2023/CVE-2023-28xx/CVE-2023-2837.json +++ b/CVE-2023/CVE-2023-28xx/CVE-2023-2837.json @@ -2,8 +2,8 @@ "id": "CVE-2023-2837", "sourceIdentifier": "security@huntr.dev", "published": "2023-05-22T18:15:09.163", - "lastModified": "2023-05-22T18:15:09.163", - "vulnStatus": "Received", + "lastModified": "2023-05-23T13:04:43.693", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-28xx/CVE-2023-2838.json b/CVE-2023/CVE-2023-28xx/CVE-2023-2838.json index a30b6a2d6ba..ef8d94db7a6 100644 --- a/CVE-2023/CVE-2023-28xx/CVE-2023-2838.json +++ b/CVE-2023/CVE-2023-28xx/CVE-2023-2838.json @@ -2,8 +2,8 @@ "id": "CVE-2023-2838", "sourceIdentifier": "security@huntr.dev", "published": "2023-05-22T18:15:09.293", - "lastModified": "2023-05-22T18:15:09.293", - "vulnStatus": "Received", + "lastModified": "2023-05-23T13:04:43.693", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-28xx/CVE-2023-2839.json b/CVE-2023/CVE-2023-28xx/CVE-2023-2839.json index cf1fe1504d0..2dd0fbc916b 100644 --- a/CVE-2023/CVE-2023-28xx/CVE-2023-2839.json +++ b/CVE-2023/CVE-2023-28xx/CVE-2023-2839.json @@ -2,8 +2,8 @@ "id": "CVE-2023-2839", "sourceIdentifier": "security@huntr.dev", "published": "2023-05-22T18:15:09.360", - "lastModified": "2023-05-22T18:15:09.360", - "vulnStatus": "Received", + "lastModified": "2023-05-23T13:04:43.693", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-28xx/CVE-2023-2840.json b/CVE-2023/CVE-2023-28xx/CVE-2023-2840.json index 5ccb133c895..87a4d2f4f34 100644 --- a/CVE-2023/CVE-2023-28xx/CVE-2023-2840.json +++ b/CVE-2023/CVE-2023-28xx/CVE-2023-2840.json @@ -2,8 +2,8 @@ "id": "CVE-2023-2840", "sourceIdentifier": "security@huntr.dev", "published": "2023-05-22T18:15:09.423", - "lastModified": "2023-05-22T18:15:09.423", - "vulnStatus": "Received", + "lastModified": "2023-05-23T13:04:43.693", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-28xx/CVE-2023-2844.json b/CVE-2023/CVE-2023-28xx/CVE-2023-2844.json index c0b6616812f..eb98f6dfa15 100644 --- a/CVE-2023/CVE-2023-28xx/CVE-2023-2844.json +++ b/CVE-2023/CVE-2023-28xx/CVE-2023-2844.json @@ -2,8 +2,8 @@ "id": "CVE-2023-2844", "sourceIdentifier": "security@huntr.dev", "published": "2023-05-23T04:15:09.497", - "lastModified": "2023-05-23T04:15:09.497", - "vulnStatus": "Received", + "lastModified": "2023-05-23T13:04:30.710", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-28xx/CVE-2023-2845.json b/CVE-2023/CVE-2023-28xx/CVE-2023-2845.json index 45fe390daf7..c3f58d7dee8 100644 --- a/CVE-2023/CVE-2023-28xx/CVE-2023-2845.json +++ b/CVE-2023/CVE-2023-28xx/CVE-2023-2845.json @@ -2,8 +2,8 @@ "id": "CVE-2023-2845", "sourceIdentifier": "security@huntr.dev", "published": "2023-05-23T05:15:08.827", - "lastModified": "2023-05-23T05:15:08.827", - "vulnStatus": "Received", + "lastModified": "2023-05-23T13:04:30.710", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-298xx/CVE-2023-29838.json b/CVE-2023/CVE-2023-298xx/CVE-2023-29838.json index 8d49a0800e4..1d58a222607 100644 --- a/CVE-2023/CVE-2023-298xx/CVE-2023-29838.json +++ b/CVE-2023/CVE-2023-298xx/CVE-2023-29838.json @@ -2,8 +2,8 @@ "id": "CVE-2023-29838", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-22T20:15:10.493", - "lastModified": "2023-05-22T20:15:10.493", - "vulnStatus": "Received", + "lastModified": "2023-05-23T13:04:43.693", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-299xx/CVE-2023-29919.json b/CVE-2023/CVE-2023-299xx/CVE-2023-29919.json index 93a8a369f9c..869d3f65d8b 100644 --- a/CVE-2023/CVE-2023-299xx/CVE-2023-29919.json +++ b/CVE-2023/CVE-2023-299xx/CVE-2023-29919.json @@ -2,8 +2,8 @@ "id": "CVE-2023-29919", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-23T01:15:09.820", - "lastModified": "2023-05-23T01:15:09.820", - "vulnStatus": "Received", + "lastModified": "2023-05-23T13:04:39.657", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-304xx/CVE-2023-30469.json b/CVE-2023/CVE-2023-304xx/CVE-2023-30469.json index 338f51d648f..96fa2ccbecc 100644 --- a/CVE-2023/CVE-2023-304xx/CVE-2023-30469.json +++ b/CVE-2023/CVE-2023-304xx/CVE-2023-30469.json @@ -2,8 +2,8 @@ "id": "CVE-2023-30469", "sourceIdentifier": "hirt@hitachi.co.jp", "published": "2023-05-23T02:15:10.333", - "lastModified": "2023-05-23T02:15:10.333", - "vulnStatus": "Received", + "lastModified": "2023-05-23T13:04:30.710", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-311xx/CVE-2023-31193.json b/CVE-2023/CVE-2023-311xx/CVE-2023-31193.json index 68bfd2f35d2..da9c51e8737 100644 --- a/CVE-2023/CVE-2023-311xx/CVE-2023-31193.json +++ b/CVE-2023/CVE-2023-311xx/CVE-2023-31193.json @@ -2,8 +2,8 @@ "id": "CVE-2023-31193", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2023-05-22T20:15:10.550", - "lastModified": "2023-05-22T20:15:10.550", - "vulnStatus": "Received", + "lastModified": "2023-05-23T13:04:43.693", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-312xx/CVE-2023-31240.json b/CVE-2023/CVE-2023-312xx/CVE-2023-31240.json index bd2941a535b..acaaa93eaae 100644 --- a/CVE-2023/CVE-2023-312xx/CVE-2023-31240.json +++ b/CVE-2023/CVE-2023-312xx/CVE-2023-31240.json @@ -2,8 +2,8 @@ "id": "CVE-2023-31240", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2023-05-22T20:15:10.633", - "lastModified": "2023-05-22T20:15:10.633", - "vulnStatus": "Received", + "lastModified": "2023-05-23T13:04:43.693", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-312xx/CVE-2023-31241.json b/CVE-2023/CVE-2023-312xx/CVE-2023-31241.json index fdadecd1d6e..96edc54641e 100644 --- a/CVE-2023/CVE-2023-312xx/CVE-2023-31241.json +++ b/CVE-2023/CVE-2023-312xx/CVE-2023-31241.json @@ -2,8 +2,8 @@ "id": "CVE-2023-31241", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2023-05-22T20:15:10.720", - "lastModified": "2023-05-22T20:15:10.720", - "vulnStatus": "Received", + "lastModified": "2023-05-23T13:04:39.657", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-312xx/CVE-2023-31245.json b/CVE-2023/CVE-2023-312xx/CVE-2023-31245.json index 58ae3287ba0..ea67d099046 100644 --- a/CVE-2023/CVE-2023-312xx/CVE-2023-31245.json +++ b/CVE-2023/CVE-2023-312xx/CVE-2023-31245.json @@ -2,8 +2,8 @@ "id": "CVE-2023-31245", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2023-05-22T20:15:10.807", - "lastModified": "2023-05-22T20:15:10.807", - "vulnStatus": "Received", + "lastModified": "2023-05-23T13:04:39.657", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-315xx/CVE-2023-31584.json b/CVE-2023/CVE-2023-315xx/CVE-2023-31584.json index 0a530b1590e..0982d541f0b 100644 --- a/CVE-2023/CVE-2023-315xx/CVE-2023-31584.json +++ b/CVE-2023/CVE-2023-315xx/CVE-2023-31584.json @@ -2,8 +2,8 @@ "id": "CVE-2023-31584", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-22T19:15:10.090", - "lastModified": "2023-05-22T19:15:10.090", - "vulnStatus": "Received", + "lastModified": "2023-05-23T13:04:43.693", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-316xx/CVE-2023-31664.json b/CVE-2023/CVE-2023-316xx/CVE-2023-31664.json index aac9e716953..40d661bda0b 100644 --- a/CVE-2023/CVE-2023-316xx/CVE-2023-31664.json +++ b/CVE-2023/CVE-2023-316xx/CVE-2023-31664.json @@ -2,8 +2,8 @@ "id": "CVE-2023-31664", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-23T01:15:09.867", - "lastModified": "2023-05-23T01:15:09.867", - "vulnStatus": "Received", + "lastModified": "2023-05-23T13:04:39.657", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-316xx/CVE-2023-31669.json b/CVE-2023/CVE-2023-316xx/CVE-2023-31669.json new file mode 100644 index 00000000000..f2be26464c2 --- /dev/null +++ b/CVE-2023/CVE-2023-316xx/CVE-2023-31669.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-31669", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-05-23T12:15:09.173", + "lastModified": "2023-05-23T13:04:30.710", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "WebAssembly wat2wasm v1.0.32 allows attackers to cause a libc++abi.dylib crash by putting '@' before a quote (\")." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/WebAssembly/wabt/issues/2165", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-316xx/CVE-2023-31670.json b/CVE-2023/CVE-2023-316xx/CVE-2023-31670.json index b4741be5673..c4c40fe7f6d 100644 --- a/CVE-2023/CVE-2023-316xx/CVE-2023-31670.json +++ b/CVE-2023/CVE-2023-316xx/CVE-2023-31670.json @@ -2,8 +2,8 @@ "id": "CVE-2023-31670", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-23T01:15:09.917", - "lastModified": "2023-05-23T01:15:09.917", - "vulnStatus": "Received", + "lastModified": "2023-05-23T13:04:39.657", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-316xx/CVE-2023-31689.json b/CVE-2023/CVE-2023-316xx/CVE-2023-31689.json index 164e3bf76b5..92c025d1787 100644 --- a/CVE-2023/CVE-2023-316xx/CVE-2023-31689.json +++ b/CVE-2023/CVE-2023-316xx/CVE-2023-31689.json @@ -2,8 +2,8 @@ "id": "CVE-2023-31689", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-22T20:15:10.887", - "lastModified": "2023-05-22T20:15:10.887", - "vulnStatus": "Received", + "lastModified": "2023-05-23T13:04:39.657", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-317xx/CVE-2023-31708.json b/CVE-2023/CVE-2023-317xx/CVE-2023-31708.json index ecc2682c149..8a7348f29aa 100644 --- a/CVE-2023/CVE-2023-317xx/CVE-2023-31708.json +++ b/CVE-2023/CVE-2023-317xx/CVE-2023-31708.json @@ -2,8 +2,8 @@ "id": "CVE-2023-31708", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-23T01:15:09.960", - "lastModified": "2023-05-23T01:15:09.960", - "vulnStatus": "Received", + "lastModified": "2023-05-23T13:04:39.657", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-317xx/CVE-2023-31740.json b/CVE-2023/CVE-2023-317xx/CVE-2023-31740.json index 34037a9b57b..a646b3e3800 100644 --- a/CVE-2023/CVE-2023-317xx/CVE-2023-31740.json +++ b/CVE-2023/CVE-2023-317xx/CVE-2023-31740.json @@ -2,8 +2,8 @@ "id": "CVE-2023-31740", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-23T01:15:10.003", - "lastModified": "2023-05-23T01:15:10.003", - "vulnStatus": "Received", + "lastModified": "2023-05-23T13:04:39.657", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-317xx/CVE-2023-31741.json b/CVE-2023/CVE-2023-317xx/CVE-2023-31741.json index 87c94d90e38..d3556bda72d 100644 --- a/CVE-2023/CVE-2023-317xx/CVE-2023-31741.json +++ b/CVE-2023/CVE-2023-317xx/CVE-2023-31741.json @@ -2,8 +2,8 @@ "id": "CVE-2023-31741", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-23T01:15:10.047", - "lastModified": "2023-05-23T01:15:10.047", - "vulnStatus": "Received", + "lastModified": "2023-05-23T13:04:34.787", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-317xx/CVE-2023-31742.json b/CVE-2023/CVE-2023-317xx/CVE-2023-31742.json index dcd1ed27085..b5e73d3c527 100644 --- a/CVE-2023/CVE-2023-317xx/CVE-2023-31742.json +++ b/CVE-2023/CVE-2023-317xx/CVE-2023-31742.json @@ -2,8 +2,8 @@ "id": "CVE-2023-31742", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-22T17:15:09.477", - "lastModified": "2023-05-22T17:15:09.477", - "vulnStatus": "Received", + "lastModified": "2023-05-23T13:04:43.693", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-318xx/CVE-2023-31814.json b/CVE-2023/CVE-2023-318xx/CVE-2023-31814.json index 1f1b7767ed2..73f4d20f469 100644 --- a/CVE-2023/CVE-2023-318xx/CVE-2023-31814.json +++ b/CVE-2023/CVE-2023-318xx/CVE-2023-31814.json @@ -2,8 +2,8 @@ "id": "CVE-2023-31814", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-23T01:15:10.087", - "lastModified": "2023-05-23T01:15:10.087", - "vulnStatus": "Received", + "lastModified": "2023-05-23T13:04:34.787", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-318xx/CVE-2023-31816.json b/CVE-2023/CVE-2023-318xx/CVE-2023-31816.json index 0eef066e130..29297b032e2 100644 --- a/CVE-2023/CVE-2023-318xx/CVE-2023-31816.json +++ b/CVE-2023/CVE-2023-318xx/CVE-2023-31816.json @@ -2,8 +2,8 @@ "id": "CVE-2023-31816", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-22T21:15:13.830", - "lastModified": "2023-05-22T21:15:13.830", - "vulnStatus": "Received", + "lastModified": "2023-05-23T13:04:39.657", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-318xx/CVE-2023-31826.json b/CVE-2023/CVE-2023-318xx/CVE-2023-31826.json index 5d04c58e138..3286cae24da 100644 --- a/CVE-2023/CVE-2023-318xx/CVE-2023-31826.json +++ b/CVE-2023/CVE-2023-318xx/CVE-2023-31826.json @@ -2,8 +2,8 @@ "id": "CVE-2023-31826", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-23T01:15:10.127", - "lastModified": "2023-05-23T01:15:10.127", - "vulnStatus": "Received", + "lastModified": "2023-05-23T13:04:34.787", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-319xx/CVE-2023-31994.json b/CVE-2023/CVE-2023-319xx/CVE-2023-31994.json index 44c5a16e218..a704ae01b1c 100644 --- a/CVE-2023/CVE-2023-319xx/CVE-2023-31994.json +++ b/CVE-2023/CVE-2023-319xx/CVE-2023-31994.json @@ -2,8 +2,8 @@ "id": "CVE-2023-31994", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-23T01:15:10.170", - "lastModified": "2023-05-23T01:15:10.170", - "vulnStatus": "Received", + "lastModified": "2023-05-23T13:04:34.787", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-319xx/CVE-2023-31995.json b/CVE-2023/CVE-2023-319xx/CVE-2023-31995.json index babb7ec4dac..f6872b956d2 100644 --- a/CVE-2023/CVE-2023-319xx/CVE-2023-31995.json +++ b/CVE-2023/CVE-2023-319xx/CVE-2023-31995.json @@ -2,8 +2,8 @@ "id": "CVE-2023-31995", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-23T01:15:10.207", - "lastModified": "2023-05-23T01:15:10.207", - "vulnStatus": "Received", + "lastModified": "2023-05-23T13:04:34.787", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-319xx/CVE-2023-31996.json b/CVE-2023/CVE-2023-319xx/CVE-2023-31996.json index 13be15be170..f4421a8d317 100644 --- a/CVE-2023/CVE-2023-319xx/CVE-2023-31996.json +++ b/CVE-2023/CVE-2023-319xx/CVE-2023-31996.json @@ -2,8 +2,8 @@ "id": "CVE-2023-31996", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-23T01:15:10.247", - "lastModified": "2023-05-23T01:15:10.247", - "vulnStatus": "Received", + "lastModified": "2023-05-23T13:04:34.787", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-332xx/CVE-2023-33203.json b/CVE-2023/CVE-2023-332xx/CVE-2023-33203.json index dc256009066..501deca58fd 100644 --- a/CVE-2023/CVE-2023-332xx/CVE-2023-33203.json +++ b/CVE-2023/CVE-2023-332xx/CVE-2023-33203.json @@ -2,7 +2,7 @@ "id": "CVE-2023-33203", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-18T08:15:08.723", - "lastModified": "2023-05-18T12:53:07.890", + "lastModified": "2023-05-23T13:15:09.837", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -12,6 +12,10 @@ ], "metrics": {}, "references": [ + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2192667", + "source": "cve@mitre.org" + }, { "url": "https://bugzilla.suse.com/show_bug.cgi?id=1210685", "source": "cve@mitre.org" diff --git a/CVE-2023/CVE-2023-333xx/CVE-2023-33338.json b/CVE-2023/CVE-2023-333xx/CVE-2023-33338.json new file mode 100644 index 00000000000..6d378c91b31 --- /dev/null +++ b/CVE-2023/CVE-2023-333xx/CVE-2023-33338.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-33338", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-05-23T13:15:09.887", + "lastModified": "2023-05-23T13:42:55.053", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Old Age Home Management 1.0 is vulnerable to SQL Injection via the username parameter." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/ANUJ-KUMAR/Old-Age-Home-Management-2022-2023-1.0", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index f78c878eab0..a2f1f7fbef3 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2023-05-23T08:06:40.569383+00:00 +2023-05-23T14:00:32.463747+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2023-05-23T07:15:10.317000+00:00 +2023-05-23T13:55:46.380000+00:00 ``` ### Last Data Feed Release @@ -29,23 +29,52 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -215835 +215843 ``` ### CVEs added in the last Commit -Recently added CVEs: `2` +Recently added CVEs: `8` -* [CVE-2023-23693](CVE-2023/CVE-2023-236xx/CVE-2023-23693.json) (`2023-05-23T07:15:10.163`) -* [CVE-2023-23694](CVE-2023/CVE-2023-236xx/CVE-2023-23694.json) (`2023-05-23T07:15:10.317`) +* [CVE-2023-31669](CVE-2023/CVE-2023-316xx/CVE-2023-31669.json) (`2023-05-23T12:15:09.173`) +* [CVE-2023-2483](CVE-2023/CVE-2023-24xx/CVE-2023-2483.json) (`2023-05-23T13:15:09.783`) +* [CVE-2023-23706](CVE-2023/CVE-2023-237xx/CVE-2023-23706.json) (`2023-05-23T13:15:09.410`) +* [CVE-2023-23724](CVE-2023/CVE-2023-237xx/CVE-2023-23724.json) (`2023-05-23T13:15:09.487`) +* [CVE-2023-25472](CVE-2023/CVE-2023-254xx/CVE-2023-25472.json) (`2023-05-23T13:15:09.563`) +* [CVE-2023-25481](CVE-2023/CVE-2023-254xx/CVE-2023-25481.json) (`2023-05-23T13:15:09.637`) +* [CVE-2023-25707](CVE-2023/CVE-2023-257xx/CVE-2023-25707.json) (`2023-05-23T13:15:09.707`) +* [CVE-2023-33338](CVE-2023/CVE-2023-333xx/CVE-2023-33338.json) (`2023-05-23T13:15:09.887`) ### CVEs modified in the last Commit -Recently modified CVEs: `2` +Recently modified CVEs: `102` -* [CVE-2022-22512](CVE-2022/CVE-2022-225xx/CVE-2022-22512.json) (`2023-05-23T07:15:09.060`) -* [CVE-2023-1731](CVE-2023/CVE-2023-17xx/CVE-2023-1731.json) (`2023-05-23T06:15:09.180`) +* [CVE-2023-2504](CVE-2023/CVE-2023-25xx/CVE-2023-2504.json) (`2023-05-23T13:04:39.657`) +* [CVE-2023-2505](CVE-2023/CVE-2023-25xx/CVE-2023-2505.json) (`2023-05-23T13:04:39.657`) +* [CVE-2023-25440](CVE-2023/CVE-2023-254xx/CVE-2023-25440.json) (`2023-05-23T13:04:39.657`) +* [CVE-2023-27068](CVE-2023/CVE-2023-270xx/CVE-2023-27068.json) (`2023-05-23T13:04:39.657`) +* [CVE-2023-29919](CVE-2023/CVE-2023-299xx/CVE-2023-29919.json) (`2023-05-23T13:04:39.657`) +* [CVE-2023-31664](CVE-2023/CVE-2023-316xx/CVE-2023-31664.json) (`2023-05-23T13:04:39.657`) +* [CVE-2023-31670](CVE-2023/CVE-2023-316xx/CVE-2023-31670.json) (`2023-05-23T13:04:39.657`) +* [CVE-2023-31708](CVE-2023/CVE-2023-317xx/CVE-2023-31708.json) (`2023-05-23T13:04:39.657`) +* [CVE-2023-31740](CVE-2023/CVE-2023-317xx/CVE-2023-31740.json) (`2023-05-23T13:04:39.657`) +* [CVE-2023-27066](CVE-2023/CVE-2023-270xx/CVE-2023-27066.json) (`2023-05-23T13:04:43.693`) +* [CVE-2023-31742](CVE-2023/CVE-2023-317xx/CVE-2023-31742.json) (`2023-05-23T13:04:43.693`) +* [CVE-2023-2837](CVE-2023/CVE-2023-28xx/CVE-2023-2837.json) (`2023-05-23T13:04:43.693`) +* [CVE-2023-2838](CVE-2023/CVE-2023-28xx/CVE-2023-2838.json) (`2023-05-23T13:04:43.693`) +* [CVE-2023-2839](CVE-2023/CVE-2023-28xx/CVE-2023-2839.json) (`2023-05-23T13:04:43.693`) +* [CVE-2023-2840](CVE-2023/CVE-2023-28xx/CVE-2023-2840.json) (`2023-05-23T13:04:43.693`) +* [CVE-2023-27067](CVE-2023/CVE-2023-270xx/CVE-2023-27067.json) (`2023-05-23T13:04:43.693`) +* [CVE-2023-28467](CVE-2023/CVE-2023-284xx/CVE-2023-28467.json) (`2023-05-23T13:04:43.693`) +* [CVE-2023-31584](CVE-2023/CVE-2023-315xx/CVE-2023-31584.json) (`2023-05-23T13:04:43.693`) +* [CVE-2023-28386](CVE-2023/CVE-2023-283xx/CVE-2023-28386.json) (`2023-05-23T13:04:43.693`) +* [CVE-2023-28412](CVE-2023/CVE-2023-284xx/CVE-2023-28412.json) (`2023-05-23T13:04:43.693`) +* [CVE-2023-28649](CVE-2023/CVE-2023-286xx/CVE-2023-28649.json) (`2023-05-23T13:04:43.693`) +* [CVE-2023-29838](CVE-2023/CVE-2023-298xx/CVE-2023-29838.json) (`2023-05-23T13:04:43.693`) +* [CVE-2023-31193](CVE-2023/CVE-2023-311xx/CVE-2023-31193.json) (`2023-05-23T13:04:43.693`) +* [CVE-2023-31240](CVE-2023/CVE-2023-312xx/CVE-2023-31240.json) (`2023-05-23T13:04:43.693`) +* [CVE-2023-33203](CVE-2023/CVE-2023-332xx/CVE-2023-33203.json) (`2023-05-23T13:15:09.837`) ## Download and Usage