From b1f1f176dc098808636bdcbca1816d73a6796f49 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Fri, 28 Jun 2024 16:04:01 +0000 Subject: [PATCH] Auto-Update: 2024-06-28T16:01:07.532461+00:00 --- CVE-2006/CVE-2006-24xx/CVE-2006-2492.json | 132 ++- CVE-2007/CVE-2007-56xx/CVE-2007-5659.json | 92 +- CVE-2008/CVE-2008-06xx/CVE-2008-0655.json | 466 ++------- CVE-2009/CVE-2009-05xx/CVE-2009-0557.json | 149 +-- CVE-2009/CVE-2009-05xx/CVE-2009-0563.json | 123 ++- CVE-2009/CVE-2009-18xx/CVE-2009-1862.json | 279 +++--- CVE-2009/CVE-2009-39xx/CVE-2009-3953.json | 606 ++---------- CVE-2009/CVE-2009-43xx/CVE-2009-4324.json | 460 +++------ CVE-2010/CVE-2010-12xx/CVE-2010-1297.json | 498 +++++----- CVE-2010/CVE-2010-25xx/CVE-2010-2568.json | 163 ++-- CVE-2010/CVE-2010-25xx/CVE-2010-2572.json | 41 +- CVE-2010/CVE-2010-28xx/CVE-2010-2883.json | 347 ++----- CVE-2011/CVE-2011-06xx/CVE-2011-0609.json | 807 +++++----------- CVE-2011/CVE-2011-18xx/CVE-2011-1823.json | 117 +-- CVE-2011/CVE-2011-24xx/CVE-2011-2462.json | 992 ++------------------ CVE-2012/CVE-2012-01xx/CVE-2012-0151.json | 106 ++- CVE-2012/CVE-2012-18xx/CVE-2012-1889.json | 168 ++-- CVE-2012/CVE-2012-50xx/CVE-2012-5054.json | 723 +------------- CVE-2013/CVE-2013-13xx/CVE-2013-1331.json | 50 +- CVE-2013/CVE-2013-25xx/CVE-2013-2596.json | 56 +- CVE-2013/CVE-2013-31xx/CVE-2013-3163.json | 166 +++- CVE-2016/CVE-2016-16xx/CVE-2016-1646.json | 146 ++- CVE-2016/CVE-2016-200xx/CVE-2016-20022.json | 12 +- CVE-2016/CVE-2016-51xx/CVE-2016-5198.json | 144 ++- CVE-2017/CVE-2017-113xx/CVE-2017-11357.json | 24 +- CVE-2017/CVE-2017-159xx/CVE-2017-15944.json | 19 +- CVE-2017/CVE-2017-50xx/CVE-2017-5030.json | 54 +- CVE-2017/CVE-2017-50xx/CVE-2017-5070.json | 41 +- CVE-2017/CVE-2017-55xx/CVE-2017-5521.json | 157 ++-- CVE-2017/CVE-2017-68xx/CVE-2017-6862.json | 42 +- CVE-2018/CVE-2018-133xx/CVE-2018-13374.json | 47 +- CVE-2018/CVE-2018-174xx/CVE-2018-17463.json | 36 +- CVE-2018/CVE-2018-174xx/CVE-2018-17480.json | 45 +- CVE-2018/CVE-2018-193xx/CVE-2018-19320.json | 34 +- CVE-2018/CVE-2018-193xx/CVE-2018-19321.json | 29 +- CVE-2018/CVE-2018-193xx/CVE-2018-19322.json | 30 +- CVE-2018/CVE-2018-193xx/CVE-2018-19323.json | 30 +- CVE-2018/CVE-2018-54xx/CVE-2018-5430.json | 16 +- CVE-2018/CVE-2018-60xx/CVE-2018-6065.json | 58 +- CVE-2019/CVE-2019-71xx/CVE-2019-7193.json | 12 +- CVE-2020/CVE-2020-289xx/CVE-2020-28949.json | 38 +- CVE-2020/CVE-2020-34xx/CVE-2020-3433.json | 5 +- CVE-2020/CVE-2020-361xx/CVE-2020-36193.json | 28 +- CVE-2021/CVE-2021-242xx/CVE-2021-24270.json | 7 +- CVE-2021/CVE-2021-305xx/CVE-2021-30533.json | 18 +- CVE-2021/CVE-2021-309xx/CVE-2021-30900.json | 20 +- CVE-2021/CVE-2021-309xx/CVE-2021-30983.json | 13 +- CVE-2021/CVE-2021-310xx/CVE-2021-31010.json | 30 +- CVE-2021/CVE-2021-381xx/CVE-2021-38163.json | 6 +- CVE-2021/CVE-2021-391xx/CVE-2021-39144.json | 23 +- CVE-2021/CVE-2021-392xx/CVE-2021-39226.json | 28 +- CVE-2021/CVE-2021-40xx/CVE-2021-4034.json | 18 +- CVE-2022/CVE-2022-215xx/CVE-2022-21587.json | 12 +- CVE-2022/CVE-2022-219xx/CVE-2022-21971.json | 111 +-- CVE-2022/CVE-2022-220xx/CVE-2022-22047.json | 121 +-- CVE-2022/CVE-2022-225xx/CVE-2022-22536.json | 9 +- CVE-2022/CVE-2022-229xx/CVE-2022-22963.json | 12 +- CVE-2022/CVE-2022-22xx/CVE-2022-2294.json | 23 +- CVE-2022/CVE-2022-247xx/CVE-2022-24706.json | 12 +- CVE-2022/CVE-2022-249xx/CVE-2022-24990.json | 12 +- CVE-2022/CVE-2022-261xx/CVE-2022-26134.json | 11 +- CVE-2022/CVE-2022-262xx/CVE-2022-26258.json | 21 +- CVE-2022/CVE-2022-269xx/CVE-2022-26923.json | 131 +-- CVE-2022/CVE-2022-269xx/CVE-2022-26925.json | 169 +--- CVE-2022/CVE-2022-275xx/CVE-2022-27518.json | 27 +- CVE-2022/CVE-2022-28xx/CVE-2022-2856.json | 54 +- CVE-2022/CVE-2022-301xx/CVE-2022-30190.json | 73 +- CVE-2022/CVE-2022-303xx/CVE-2022-30333.json | 38 +- CVE-2022/CVE-2022-30xx/CVE-2022-3038.json | 16 +- CVE-2022/CVE-2022-30xx/CVE-2022-3075.json | 10 +- CVE-2022/CVE-2022-328xx/CVE-2022-32893.json | 18 +- CVE-2022/CVE-2022-347xx/CVE-2022-34713.json | 121 +-- CVE-2022/CVE-2022-368xx/CVE-2022-36804.json | 12 +- CVE-2022/CVE-2022-379xx/CVE-2022-37969.json | 152 +-- CVE-2022/CVE-2022-37xx/CVE-2022-3723.json | 14 +- CVE-2022/CVE-2022-381xx/CVE-2022-38181.json | 11 +- CVE-2022/CVE-2022-406xx/CVE-2022-40684.json | 15 +- CVE-2022/CVE-2022-410xx/CVE-2022-41033.json | 70 +- CVE-2022/CVE-2022-410xx/CVE-2022-41040.json | 10 +- CVE-2022/CVE-2022-410xx/CVE-2022-41049.json | 108 +-- CVE-2022/CVE-2022-410xx/CVE-2022-41073.json | 92 +- CVE-2022/CVE-2022-410xx/CVE-2022-41080.json | 11 +- CVE-2022/CVE-2022-410xx/CVE-2022-41082.json | 10 +- CVE-2022/CVE-2022-410xx/CVE-2022-41091.json | 88 +- CVE-2022/CVE-2022-411xx/CVE-2022-41125.json | 76 +- CVE-2022/CVE-2022-411xx/CVE-2022-41128.json | 71 +- CVE-2022/CVE-2022-413xx/CVE-2022-41328.json | 21 +- CVE-2022/CVE-2022-41xx/CVE-2022-4135.json | 13 +- CVE-2022/CVE-2022-424xx/CVE-2022-42475.json | 51 +- CVE-2022/CVE-2022-428xx/CVE-2022-42856.json | 10 +- CVE-2022/CVE-2022-446xx/CVE-2022-44698.json | 66 +- CVE-2022/CVE-2022-448xx/CVE-2022-44877.json | 12 +- CVE-2022/CVE-2022-461xx/CVE-2022-46169.json | 9 +- CVE-2022/CVE-2022-479xx/CVE-2022-47966.json | 55 +- CVE-2023/CVE-2023-06xx/CVE-2023-0669.json | 12 +- CVE-2023/CVE-2023-216xx/CVE-2023-21674.json | 117 +-- CVE-2023/CVE-2023-229xx/CVE-2023-22952.json | 12 +- CVE-2023/CVE-2023-235xx/CVE-2023-23529.json | 31 +- CVE-2023/CVE-2023-248xx/CVE-2023-24880.json | 5 +- CVE-2023/CVE-2023-263xx/CVE-2023-26360.json | 24 +- CVE-2023/CVE-2023-276xx/CVE-2023-27636.json | 7 +- CVE-2023/CVE-2023-478xx/CVE-2023-47802.json | 56 ++ CVE-2023/CVE-2023-478xx/CVE-2023-47803.json | 56 ++ CVE-2023/CVE-2023-527xx/CVE-2023-52722.json | 7 +- CVE-2023/CVE-2023-528xx/CVE-2023-52892.json | 5 +- CVE-2024/CVE-2024-13xx/CVE-2024-1330.json | 66 +- CVE-2024/CVE-2024-14xx/CVE-2024-1493.json | 95 +- CVE-2024/CVE-2024-18xx/CVE-2024-1816.json | 95 +- CVE-2024/CVE-2024-21xx/CVE-2024-2191.json | 95 +- CVE-2024/CVE-2024-222xx/CVE-2024-22260.json | 5 +- CVE-2024/CVE-2024-222xx/CVE-2024-22272.json | 5 +- CVE-2024/CVE-2024-222xx/CVE-2024-22276.json | 5 +- CVE-2024/CVE-2024-236xx/CVE-2024-23692.json | 10 +- CVE-2024/CVE-2024-23xx/CVE-2024-2363.json | 10 +- CVE-2024/CVE-2024-262xx/CVE-2024-26260.json | 7 +- CVE-2024/CVE-2024-262xx/CVE-2024-26261.json | 7 +- CVE-2024/CVE-2024-27xx/CVE-2024-2795.json | 48 + CVE-2024/CVE-2024-290xx/CVE-2024-29038.json | 64 ++ CVE-2024/CVE-2024-29xx/CVE-2024-2973.json | 49 +- CVE-2024/CVE-2024-301xx/CVE-2024-30109.json | 56 ++ CVE-2024/CVE-2024-301xx/CVE-2024-30110.json | 56 ++ CVE-2024/CVE-2024-301xx/CVE-2024-30111.json | 56 ++ CVE-2024/CVE-2024-301xx/CVE-2024-30135.json | 56 ++ CVE-2024/CVE-2024-318xx/CVE-2024-31802.json | 5 +- CVE-2024/CVE-2024-31xx/CVE-2024-3111.json | 66 +- CVE-2024/CVE-2024-31xx/CVE-2024-3115.json | 95 +- CVE-2024/CVE-2024-360xx/CVE-2024-36059.json | 5 +- CVE-2024/CVE-2024-360xx/CVE-2024-36072.json | 5 +- CVE-2024/CVE-2024-360xx/CVE-2024-36073.json | 5 +- CVE-2024/CVE-2024-360xx/CVE-2024-36074.json | 5 +- CVE-2024/CVE-2024-360xx/CVE-2024-36075.json | 5 +- CVE-2024/CVE-2024-367xx/CVE-2024-36755.json | 5 +- CVE-2024/CVE-2024-371xx/CVE-2024-37107.json | 9 +- CVE-2024/CVE-2024-371xx/CVE-2024-37109.json | 9 +- CVE-2024/CVE-2024-371xx/CVE-2024-37111.json | 9 +- CVE-2024/CVE-2024-371xx/CVE-2024-37137.json | 56 ++ CVE-2024/CVE-2024-372xx/CVE-2024-37282.json | 56 ++ CVE-2024/CVE-2024-377xx/CVE-2024-37741.json | 29 + CVE-2024/CVE-2024-385xx/CVE-2024-38523.json | 5 +- CVE-2024/CVE-2024-385xx/CVE-2024-38531.json | 60 ++ CVE-2024/CVE-2024-38xx/CVE-2024-3800.json | 37 + CVE-2024/CVE-2024-38xx/CVE-2024-3801.json | 37 + CVE-2024/CVE-2024-38xx/CVE-2024-3816.json | 37 + CVE-2024/CVE-2024-391xx/CVE-2024-39129.json | 5 +- CVE-2024/CVE-2024-391xx/CVE-2024-39130.json | 5 +- CVE-2024/CVE-2024-391xx/CVE-2024-39132.json | 5 +- CVE-2024/CVE-2024-391xx/CVE-2024-39133.json | 5 +- CVE-2024/CVE-2024-391xx/CVE-2024-39134.json | 5 +- CVE-2024/CVE-2024-392xx/CVE-2024-39207.json | 5 +- CVE-2024/CVE-2024-392xx/CVE-2024-39208.json | 5 +- CVE-2024/CVE-2024-392xx/CVE-2024-39209.json | 5 +- CVE-2024/CVE-2024-393xx/CVE-2024-39347.json | 56 ++ CVE-2024/CVE-2024-393xx/CVE-2024-39348.json | 56 ++ CVE-2024/CVE-2024-393xx/CVE-2024-39349.json | 56 ++ CVE-2024/CVE-2024-393xx/CVE-2024-39350.json | 56 ++ CVE-2024/CVE-2024-393xx/CVE-2024-39351.json | 56 ++ CVE-2024/CVE-2024-393xx/CVE-2024-39352.json | 56 ++ CVE-2024/CVE-2024-397xx/CVE-2024-39704.json | 25 + CVE-2024/CVE-2024-397xx/CVE-2024-39705.json | 5 +- CVE-2024/CVE-2024-397xx/CVE-2024-39708.json | 44 + CVE-2024/CVE-2024-39xx/CVE-2024-3959.json | 95 +- CVE-2024/CVE-2024-40xx/CVE-2024-4011.json | 95 +- CVE-2024/CVE-2024-43xx/CVE-2024-4395.json | 52 +- CVE-2024/CVE-2024-45xx/CVE-2024-4557.json | 95 +- CVE-2024/CVE-2024-45xx/CVE-2024-4569.json | 72 +- CVE-2024/CVE-2024-45xx/CVE-2024-4570.json | 72 +- CVE-2024/CVE-2024-46xx/CVE-2024-4664.json | 66 +- CVE-2024/CVE-2024-47xx/CVE-2024-4704.json | 66 +- CVE-2024/CVE-2024-49xx/CVE-2024-4901.json | 95 +- CVE-2024/CVE-2024-52xx/CVE-2024-5289.json | 72 +- CVE-2024/CVE-2024-54xx/CVE-2024-5424.json | 64 ++ CVE-2024/CVE-2024-54xx/CVE-2024-5430.json | 95 +- CVE-2024/CVE-2024-55xx/CVE-2024-5570.json | 21 + CVE-2024/CVE-2024-56xx/CVE-2024-5601.json | 77 +- CVE-2024/CVE-2024-56xx/CVE-2024-5642.json | 5 +- CVE-2024/CVE-2024-56xx/CVE-2024-5655.json | 95 +- CVE-2024/CVE-2024-56xx/CVE-2024-5662.json | 56 ++ CVE-2024/CVE-2024-57xx/CVE-2024-5727.json | 21 + CVE-2024/CVE-2024-57xx/CVE-2024-5728.json | 21 + CVE-2024/CVE-2024-57xx/CVE-2024-5729.json | 21 + CVE-2024/CVE-2024-57xx/CVE-2024-5730.json | 21 + CVE-2024/CVE-2024-57xx/CVE-2024-5735.json | 94 ++ CVE-2024/CVE-2024-57xx/CVE-2024-5736.json | 94 ++ CVE-2024/CVE-2024-57xx/CVE-2024-5737.json | 94 ++ CVE-2024/CVE-2024-57xx/CVE-2024-5788.json | 48 + CVE-2024/CVE-2024-57xx/CVE-2024-5796.json | 48 + CVE-2024/CVE-2024-58xx/CVE-2024-5863.json | 48 + CVE-2024/CVE-2024-58xx/CVE-2024-5864.json | 48 + CVE-2024/CVE-2024-59xx/CVE-2024-5922.json | 48 + CVE-2024/CVE-2024-59xx/CVE-2024-5925.json | 48 + CVE-2024/CVE-2024-60xx/CVE-2024-6054.json | 65 +- CVE-2024/CVE-2024-60xx/CVE-2024-6071.json | 49 +- CVE-2024/CVE-2024-61xx/CVE-2024-6127.json | 5 +- CVE-2024/CVE-2024-62xx/CVE-2024-6283.json | 50 +- CVE-2024/CVE-2024-62xx/CVE-2024-6288.json | 56 ++ CVE-2024/CVE-2024-62xx/CVE-2024-6296.json | 52 + CVE-2024/CVE-2024-63xx/CVE-2024-6307.json | 9 +- CVE-2024/CVE-2024-63xx/CVE-2024-6323.json | 71 +- README.md | 70 +- _state.csv | 357 +++---- 200 files changed, 8292 insertions(+), 6175 deletions(-) create mode 100644 CVE-2023/CVE-2023-478xx/CVE-2023-47802.json create mode 100644 CVE-2023/CVE-2023-478xx/CVE-2023-47803.json create mode 100644 CVE-2024/CVE-2024-27xx/CVE-2024-2795.json create mode 100644 CVE-2024/CVE-2024-290xx/CVE-2024-29038.json create mode 100644 CVE-2024/CVE-2024-301xx/CVE-2024-30109.json create mode 100644 CVE-2024/CVE-2024-301xx/CVE-2024-30110.json create mode 100644 CVE-2024/CVE-2024-301xx/CVE-2024-30111.json create mode 100644 CVE-2024/CVE-2024-301xx/CVE-2024-30135.json create mode 100644 CVE-2024/CVE-2024-371xx/CVE-2024-37137.json create mode 100644 CVE-2024/CVE-2024-372xx/CVE-2024-37282.json create mode 100644 CVE-2024/CVE-2024-377xx/CVE-2024-37741.json create mode 100644 CVE-2024/CVE-2024-385xx/CVE-2024-38531.json create mode 100644 CVE-2024/CVE-2024-38xx/CVE-2024-3800.json create mode 100644 CVE-2024/CVE-2024-38xx/CVE-2024-3801.json create mode 100644 CVE-2024/CVE-2024-38xx/CVE-2024-3816.json create mode 100644 CVE-2024/CVE-2024-393xx/CVE-2024-39347.json create mode 100644 CVE-2024/CVE-2024-393xx/CVE-2024-39348.json create mode 100644 CVE-2024/CVE-2024-393xx/CVE-2024-39349.json create mode 100644 CVE-2024/CVE-2024-393xx/CVE-2024-39350.json create mode 100644 CVE-2024/CVE-2024-393xx/CVE-2024-39351.json create mode 100644 CVE-2024/CVE-2024-393xx/CVE-2024-39352.json create mode 100644 CVE-2024/CVE-2024-397xx/CVE-2024-39704.json create mode 100644 CVE-2024/CVE-2024-397xx/CVE-2024-39708.json create mode 100644 CVE-2024/CVE-2024-54xx/CVE-2024-5424.json create mode 100644 CVE-2024/CVE-2024-55xx/CVE-2024-5570.json create mode 100644 CVE-2024/CVE-2024-56xx/CVE-2024-5662.json create mode 100644 CVE-2024/CVE-2024-57xx/CVE-2024-5727.json create mode 100644 CVE-2024/CVE-2024-57xx/CVE-2024-5728.json create mode 100644 CVE-2024/CVE-2024-57xx/CVE-2024-5729.json create mode 100644 CVE-2024/CVE-2024-57xx/CVE-2024-5730.json create mode 100644 CVE-2024/CVE-2024-57xx/CVE-2024-5735.json create mode 100644 CVE-2024/CVE-2024-57xx/CVE-2024-5736.json create mode 100644 CVE-2024/CVE-2024-57xx/CVE-2024-5737.json create mode 100644 CVE-2024/CVE-2024-57xx/CVE-2024-5788.json create mode 100644 CVE-2024/CVE-2024-57xx/CVE-2024-5796.json create mode 100644 CVE-2024/CVE-2024-58xx/CVE-2024-5863.json create mode 100644 CVE-2024/CVE-2024-58xx/CVE-2024-5864.json create mode 100644 CVE-2024/CVE-2024-59xx/CVE-2024-5922.json create mode 100644 CVE-2024/CVE-2024-59xx/CVE-2024-5925.json create mode 100644 CVE-2024/CVE-2024-62xx/CVE-2024-6288.json create mode 100644 CVE-2024/CVE-2024-62xx/CVE-2024-6296.json diff --git a/CVE-2006/CVE-2006-24xx/CVE-2006-2492.json b/CVE-2006/CVE-2006-24xx/CVE-2006-2492.json index 986e4ba7bef..6701c6e3db4 100644 --- a/CVE-2006/CVE-2006-24xx/CVE-2006-2492.json +++ b/CVE-2006/CVE-2006-24xx/CVE-2006-2492.json @@ -2,8 +2,9 @@ "id": "CVE-2006-2492", "sourceIdentifier": "cret@cert.org", "published": "2006-05-20T00:02:00.000", - "lastModified": "2018-10-12T21:40:15.057", - "vulnStatus": "Modified", + "lastModified": "2024-06-28T14:15:04.557", + "vulnStatus": "Analyzed", + "cveTags": [], "cisaExploitAdd": "2022-06-08", "cisaActionDue": "2022-06-22", "cisaRequiredAction": "Apply updates per vendor instructions.", @@ -15,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -48,7 +71,7 @@ "description": [ { "lang": "en", - "value": "NVD-CWE-Other" + "value": "CWE-120" } ] } @@ -62,8 +85,30 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:word:2003:*:*:*:*:*:*:*", - "matchCriteriaId": "379C2A4A-78EF-473D-954B-F5DD76C3D6CF" + "criteria": "cpe:2.3:a:microsoft:office:2000:sp3:*:*:*:*:*:*", + "matchCriteriaId": "4891122F-AD7F-45E6-98C6-833227916F6B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:office:2003:sp1:*:*:*:*:*:*", + "matchCriteriaId": "4EED9D78-AE73-44BA-A1CE-603994E92E89" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:office:2003:sp2:*:*:*:*:*:*", + "matchCriteriaId": "07D3F3E4-93FB-481A-94D9-075E726697C4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:office:xp:sp3:*:*:*:*:*:*", + "matchCriteriaId": "79BA1175-7F02-4435-AEA6-1BA8AADEB7EF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:works_suite:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2000", + "versionEndIncluding": "2006", + "matchCriteriaId": "CB6B64C0-E58E-4606-A6DD-AEF2C6F5D33F" } ] } @@ -73,54 +118,83 @@ "references": [ { "url": "http://blogs.technet.com/msrc/archive/2006/05/19/429353.aspx", - "source": "cret@cert.org" + "source": "cret@cert.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://isc.sans.org/diary.php?storyid=1345", - "source": "cret@cert.org" + "source": "cret@cert.org", + "tags": [ + "Exploit" + ] }, { "url": "http://isc.sans.org/diary.php?storyid=1346", - "source": "cret@cert.org" + "source": "cret@cert.org", + "tags": [ + "Exploit" + ] }, { "url": "http://secunia.com/advisories/20153", "source": "cret@cert.org", "tags": [ + "Broken Link", "Patch", "Vendor Advisory" ] }, { "url": "http://securitytracker.com/id?1016130", - "source": "cret@cert.org" + "source": "cret@cert.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.kb.cert.org/vuls/id/446012", "source": "cret@cert.org", "tags": [ + "Third Party Advisory", "US Government Resource" ] }, { "url": "http://www.microsoft.com/technet/security/advisory/919637.mspx", - "source": "cret@cert.org" + "source": "cret@cert.org", + "tags": [ + "Broken Link", + "Patch", + "Vendor Advisory" + ] }, { "url": "http://www.osvdb.org/25635", - "source": "cret@cert.org" + "source": "cret@cert.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.securityfocus.com/bid/18037", "source": "cret@cert.org", "tags": [ - "Patch" + "Broken Link", + "Patch", + "Third Party Advisory", + "VDB Entry" ] }, { "url": "http://www.us-cert.gov/cas/techalerts/TA06-139A.html", "source": "cret@cert.org", "tags": [ + "Broken Link", + "Third Party Advisory", "US Government Resource" ] }, @@ -128,32 +202,54 @@ "url": "http://www.us-cert.gov/cas/techalerts/TA06-164A.html", "source": "cret@cert.org", "tags": [ + "Broken Link", + "Third Party Advisory", "US Government Resource" ] }, { "url": "http://www.vupen.com/english/advisories/2006/1872", - "source": "cret@cert.org" + "source": "cret@cert.org", + "tags": [ + "Broken Link" + ] }, { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-027", - "source": "cret@cert.org" + "source": "cret@cert.org", + "tags": [ + "Patch", + "Vendor Advisory" + ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26556", - "source": "cret@cert.org" + "source": "cret@cert.org", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1418", - "source": "cret@cert.org" + "source": "cret@cert.org", + "tags": [ + "Broken Link" + ] }, { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1738", - "source": "cret@cert.org" + "source": "cret@cert.org", + "tags": [ + "Broken Link" + ] }, { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2068", - "source": "cret@cert.org" + "source": "cret@cert.org", + "tags": [ + "Broken Link" + ] } ] } \ No newline at end of file diff --git a/CVE-2007/CVE-2007-56xx/CVE-2007-5659.json b/CVE-2007/CVE-2007-56xx/CVE-2007-5659.json index 7923e05a6cf..4348ab3df98 100644 --- a/CVE-2007/CVE-2007-56xx/CVE-2007-5659.json +++ b/CVE-2007/CVE-2007-56xx/CVE-2007-5659.json @@ -2,8 +2,9 @@ "id": "CVE-2007-5659", "sourceIdentifier": "cve@mitre.org", "published": "2008-02-12T19:00:00.000", - "lastModified": "2017-09-29T01:29:40.190", - "vulnStatus": "Modified", + "lastModified": "2024-06-28T14:15:25.450", + "vulnStatus": "Analyzed", + "cveTags": [], "cisaExploitAdd": "2022-06-08", "cisaActionDue": "2022-06-22", "cisaRequiredAction": "Apply updates per vendor instructions.", @@ -19,6 +20,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -52,7 +75,7 @@ "description": [ { "lang": "en", - "value": "CWE-119" + "value": "CWE-120" } ] } @@ -67,14 +90,14 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*", - "versionEndIncluding": "8.1.1", - "matchCriteriaId": "3A068220-ADFE-46F0-AE35-3355BEFEECD9" + "versionEndExcluding": "8.1.2", + "matchCriteriaId": "B1BF2209-B59C-497A-AEA7-154C1A140157" }, { "vulnerable": true, "criteria": "cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:*", - "versionEndIncluding": "8.1.1", - "matchCriteriaId": "82321E60-2553-41E2-A4F4-375CFF011C0A" + "versionEndExcluding": "8.1.2", + "matchCriteriaId": "AC62F510-1939-40B4-A219-84FE2C1F7CCA" } ] } @@ -84,64 +107,97 @@ "references": [ { "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=657", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://secunia.com/advisories/29065", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://secunia.com/advisories/29205", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://secunia.com/advisories/30840", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://security.gentoo.org/glsa/glsa-200803-01.xml", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-239286-1", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.adobe.com/support/security/advisories/apsa08-01.html", "source": "cve@mitre.org", "tags": [ - "Patch" + "Vendor Advisory" ] }, { "url": "http://www.adobe.com/support/security/bulletins/apsb08-13.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "http://www.kb.cert.org/vuls/id/666281", "source": "cve@mitre.org", "tags": [ + "Third Party Advisory", "US Government Resource" ] }, { "url": "http://www.redhat.com/support/errata/RHSA-2008-0144.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.us-cert.gov/cas/techalerts/TA08-043A.html", "source": "cve@mitre.org", "tags": [ + "Broken Link", + "Third Party Advisory", "US Government Resource" ] }, { "url": "http://www.vupen.com/english/advisories/2008/1966/references", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9813", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] } ] } \ No newline at end of file diff --git a/CVE-2008/CVE-2008-06xx/CVE-2008-0655.json b/CVE-2008/CVE-2008-06xx/CVE-2008-0655.json index 20efb0f0e96..f301b101d7d 100644 --- a/CVE-2008/CVE-2008-06xx/CVE-2008-0655.json +++ b/CVE-2008/CVE-2008-06xx/CVE-2008-0655.json @@ -2,8 +2,9 @@ "id": "CVE-2008-0655", "sourceIdentifier": "cve@mitre.org", "published": "2008-02-07T21:00:00.000", - "lastModified": "2018-10-30T16:25:16.967", - "vulnStatus": "Modified", + "lastModified": "2024-06-28T14:15:34.880", + "vulnStatus": "Analyzed", + "cveTags": [], "cisaExploitAdd": "2022-06-08", "cisaActionDue": "2022-06-22", "cisaRequiredAction": "Apply updates per vendor instructions.", @@ -19,6 +20,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -67,178 +90,8 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*", - "versionEndIncluding": "8.1.1", - "matchCriteriaId": "3A068220-ADFE-46F0-AE35-3355BEFEECD9" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:3.0:*:*:*:*:*:*:*", - "matchCriteriaId": "465F9134-DD86-4F13-8C39-949BE6E7389A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:3.1:*:*:*:*:*:*:*", - "matchCriteriaId": "BB041EDF-EFF8-4AA6-8D59-411975547534" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:4.0:*:*:*:*:*:*:*", - "matchCriteriaId": "4C05F6A5-0FB3-489B-9B8B-64C569C03D7A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:4.0.5:*:*:*:*:*:*:*", - "matchCriteriaId": "AABA4FE3-662B-4956-904D-45086E000890" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:4.0.5a:*:*:*:*:*:*:*", - "matchCriteriaId": "998CD79C-458E-46A8-8261-1C40C53D9FA5" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:4.0.5c:*:*:*:*:*:*:*", - "matchCriteriaId": "0155FB0B-7FAD-4388-96C8-A8543B4FDFD9" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:5.0:*:*:*:*:*:*:*", - "matchCriteriaId": "201F059D-33D1-4D9F-9C6F-FC8EB49E4735" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:5.0.5:*:*:*:*:*:*:*", - "matchCriteriaId": "B025E795-5713-485E-8A15-EBE4451A1A46" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:5.0.6:*:*:*:*:*:*:*", - "matchCriteriaId": "B453FA1D-0FE9-4324-9644-E167561926C2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:5.0.10:*:*:*:*:*:*:*", - "matchCriteriaId": "FDEA946E-B6D2-463B-89D0-F2F37278089E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:6.0:*:*:*:*:*:*:*", - "matchCriteriaId": "183B5940-2310-4D2E-99F0-9792A801A442" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:6.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "4F8BB13E-2732-4F9E-A588-EA1C00893C8B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:6.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "E5FCDCBF-597B-439C-8D8B-2819FC70C567" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:6.0.3:*:*:*:*:*:*:*", - "matchCriteriaId": "440B890A-90E9-4456-B92A-856CD17F0C78" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:6.0.4:*:*:*:*:*:*:*", - "matchCriteriaId": "79BD9D8D-39DA-403E-915D-E1B6A46A6BAB" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:6.0.5:*:*:*:*:*:*:*", - "matchCriteriaId": "8976A7DC-1314-4C4A-A7C5-AA789D2DAB9C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:6.0.6:*:*:*:*:*:*:*", - "matchCriteriaId": "37854E7C-2166-48D7-AE8C-44C9468C38C7" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:7.0:*:*:*:*:*:*:*", - "matchCriteriaId": "FECFC942-4F04-420C-A9B4-AE0C0590317F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:7.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "F81817F2-1E3A-4A52-88F1-6B614A2A1F0A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:7.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "CFFFFF0D-A80F-4B67-BEE2-86868EF7AA37" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:7.0.3:*:*:*:*:*:*:*", - "matchCriteriaId": "1DC97A87-2652-4AD6-8E10-419A9AC9C245" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:7.0.4:*:*:*:*:*:*:*", - "matchCriteriaId": "3E1F71AE-3591-499E-B09F-AAC4E38F1CF2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:7.0.5:*:*:*:*:*:*:*", - "matchCriteriaId": "2D75174C-EBF9-4117-9E66-80E847012853" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:7.0.6:*:*:*:*:*:*:*", - "matchCriteriaId": "69B0305A-51D3-4E09-B96C-54B0ED921DA3" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:7.0.7:*:*:*:*:*:*:*", - "matchCriteriaId": "9762FE57-837B-4FFA-9813-AC038450EB2B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:7.0.8:*:*:*:*:*:*:*", - "matchCriteriaId": "0055A38C-E421-40A1-8BC7-11856A20B8F0" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:7.0.9:*:*:*:*:*:*:*", - "matchCriteriaId": "758CC9EE-8929-405B-A845-83BAAECCB2AD" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:7.1.0:*:*:*:*:*:*:*", - "matchCriteriaId": "24A7CF98-27EC-406A-98E2-ACC1AAAF5C93" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:7.1.1:*:*:*:*:*:*:*", - "matchCriteriaId": "BC1BD70D-7A92-4309-A40C-9BD500997390" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:7.1.2:*:*:*:*:*:*:*", - "matchCriteriaId": "F9C17896-8895-4731-B77A-F488A94F0CBD" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:7.1.3:*:*:*:*:*:*:*", - "matchCriteriaId": "21AC1961-12F7-456F-9CE4-9AAF116CF141" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:7.1.4:*:*:*:*:*:*:*", - "matchCriteriaId": "DF9F1050-B6BE-4B99-882B-36D6E187304D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:8.0:*:*:*:*:*:*:*", - "matchCriteriaId": "26AE76F7-D7F6-4AF2-A5C6-708B5642C288" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:8.1:*:*:*:*:*:*:*", - "matchCriteriaId": "749FFB51-65D4-4A4B-95F3-742440276897" + "versionEndExcluding": "8.1.2", + "matchCriteriaId": "B1BF2209-B59C-497A-AEA7-154C1A140157" } ] } @@ -253,208 +106,8 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:*", - "versionEndIncluding": "8.1.1", - "matchCriteriaId": "82321E60-2553-41E2-A4F4-375CFF011C0A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:3.0:*:*:*:*:*:*:*", - "matchCriteriaId": "B1C92642-7C8D-411A-8726-06A8A6483D65" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:3.01:*:*:*:*:*:*:*", - "matchCriteriaId": "3CBE2E6C-AF0E-4A77-9EB0-3593889BC676" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:3.02:*:*:*:*:*:*:*", - "matchCriteriaId": "4B5C5C14-383C-4630-858E-D40D6C32FD4B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:4.0:*:*:*:*:*:*:*", - "matchCriteriaId": "F509566A-6D4A-40C0-8A16-F8765C5DCAAF" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:4.0.5:*:*:*:*:*:*:*", - "matchCriteriaId": "707D7124-6063-4510-80B4-AD9675996F67" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:4.0.5a:*:*:*:*:*:*:*", - "matchCriteriaId": "200FFAE3-CC1C-4A11-99AD-377D54A67195" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:4.0.5c:*:*:*:*:*:*:*", - "matchCriteriaId": "8A990E86-07C0-49E2-92D6-55E499F30FAE" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:4.5:*:*:*:*:*:*:*", - "matchCriteriaId": "6AED985D-60D7-489E-9F1E-CE3C9D985B7A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:5.0:*:*:*:*:*:*:*", - "matchCriteriaId": "5F0FCA2F-FD7F-4CE5-9D45-324A7EC45105" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:5.0.5:*:*:*:*:*:*:*", - "matchCriteriaId": "EF7EAA22-CED2-4379-9465-9562BACB1C20" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:5.0.6:*:*:*:*:*:*:*", - "matchCriteriaId": "35B1CA6B-600C-4E03-B4D5-3D7E1BC4D0F9" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:5.0.7:*:*:*:*:*:*:*", - "matchCriteriaId": "F7AA1BA3-9FFA-46AB-A92A-7247D5F7EA06" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:5.0.9:*:*:*:*:*:*:*", - "matchCriteriaId": "3F5F7424-1E19-4078-8908-CD86A0185042" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:5.0.10:*:*:*:*:*:*:*", - "matchCriteriaId": "F2402B40-6B72-48B5-A376-DA8D16CA43FA" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:5.0.11:*:*:*:*:*:*:*", - "matchCriteriaId": "0D968113-340A-4E5A-B4FD-D9702D49E3DC" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:5.1:*:*:*:*:*:*:*", - "matchCriteriaId": "ACF742B8-5F7A-487B-835C-756B1BB392F4" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:6.0:*:*:*:*:*:*:*", - "matchCriteriaId": "C0BB7C0C-B1D6-4733-BA91-022A1A7FB2E2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:6.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "0B131DB8-4B6A-4AF2-8D5E-B5EA1AEBFB3B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:6.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "5B9351C2-16ED-4766-B417-8DB3A8766C2F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:6.0.3:*:*:*:*:*:*:*", - "matchCriteriaId": "74667860-0047-40AD-9468-860591BA9D17" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:6.0.4:*:*:*:*:*:*:*", - "matchCriteriaId": "5DEA092A-5532-4DCC-B43D-7A8ECF07FA4C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:6.0.5:*:*:*:*:*:*:*", - "matchCriteriaId": "9628AFF9-6EE1-4E85-858F-AE96EE64B7F4" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:6.0.6:*:*:*:*:*:*:*", - "matchCriteriaId": "B95511FD-C8F1-478F-B6DF-1D0E068845D3" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:7.0:*:*:*:*:*:*:*", - "matchCriteriaId": "6E2D0266-6954-4DBA-9EEE-8BF73B39DD61" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:7.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "24262AFA-2EC8-479E-8922-36DB4243E404" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:7.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "F1E62096-08B2-4722-A492-11E9A441E85B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:7.0.3:*:*:*:*:*:*:*", - "matchCriteriaId": "C5370AC6-90EE-48EA-8DBD-54002B102F7C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:7.0.4:*:*:*:*:*:*:*", - "matchCriteriaId": "C36D10A8-D211-437D-98D8-9029D0A9CF8B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:7.0.5:*:*:*:*:*:*:*", - "matchCriteriaId": "BA55D00C-3629-48E4-8699-F62B8D703E02" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:7.0.6:*:*:*:*:*:*:*", - "matchCriteriaId": "0EE5E1B7-7B91-4AE1-92AA-4F1763E1BA1E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:7.0.7:*:*:*:*:*:*:*", - "matchCriteriaId": "623324C2-C8B5-4C3C-9C10-9677D5A6740A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:7.0.8:*:*:*:*:*:*:*", - "matchCriteriaId": "B8EAF5E3-F3B4-4AD3-B5F1-281AB0F9C57F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:7.0.9:*:*:*:*:*:*:*", - "matchCriteriaId": "634396D6-4ED6-4F4D-9458-396373489589" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:7.1.0:*:*:*:*:*:*:*", - "matchCriteriaId": "9A265869-EF58-428E-B8BB-30CABCBE0A83" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:7.1.1:*:*:*:*:*:*:*", - "matchCriteriaId": "ADB421CD-85DE-4495-93B7-46708449AE27" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:7.1.2:*:*:*:*:*:*:*", - "matchCriteriaId": "32049561-270C-4B18-9E96-EA0F66ACECAA" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:7.1.3:*:*:*:*:*:*:*", - "matchCriteriaId": "5491D310-E1C0-4FCB-9DCA-97CA1F95D4BA" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:7.1.4:*:*:*:*:*:*:*", - "matchCriteriaId": "1976F77D-D8D2-4107-A1C4-05D776A02FAE" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:8.0:*:*:*:*:*:*:*", - "matchCriteriaId": "996EB48E-D2A8-49E4-915A-EBDE26A9FB94" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:8.1:*:*:*:*:*:*:*", - "matchCriteriaId": "97E20936-EE31-4CEB-A710-3165A28BAD69" + "versionEndExcluding": "8.1.2", + "matchCriteriaId": "AC62F510-1939-40B4-A219-84FE2C1F7CCA" } ] } @@ -464,20 +117,30 @@ "references": [ { "url": "http://blogs.adobe.com/acroread/2008/02/adobe_reader_812_for_linux_and.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://kb.adobe.com/selfservice/viewContent.do?externalId=kb403079&sliceId=1", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00007.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://secunia.com/advisories/28802", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Patch", "Vendor Advisory" ] @@ -486,6 +149,7 @@ "url": "http://secunia.com/advisories/28851", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Vendor Advisory" ] }, @@ -493,6 +157,7 @@ "url": "http://secunia.com/advisories/28983", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Vendor Advisory" ] }, @@ -500,6 +165,7 @@ "url": "http://secunia.com/advisories/29065", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Vendor Advisory" ] }, @@ -507,6 +173,7 @@ "url": "http://secunia.com/advisories/29205", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Vendor Advisory" ] }, @@ -514,20 +181,32 @@ "url": "http://secunia.com/advisories/30840", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Vendor Advisory" ] }, { "url": "http://security.gentoo.org/glsa/glsa-200803-01.xml", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://securitytracker.com/id?1019346", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-239286-1", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.adobe.com/support/security/advisories/apsa08-01.html", @@ -545,37 +224,52 @@ }, { "url": "http://www.redhat.com/support/errata/RHSA-2008-0144.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.securityfocus.com/bid/27641", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Exploit", - "Patch" + "Patch", + "Third Party Advisory", + "VDB Entry" ] }, { "url": "http://www.us-cert.gov/cas/techalerts/TA08-043A.html", "source": "cve@mitre.org", "tags": [ + "Broken Link", + "Third Party Advisory", "US Government Resource" ] }, { "url": "http://www.vupen.com/english/advisories/2008/0425", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.vupen.com/english/advisories/2008/1966/references", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Vendor Advisory" ] }, { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10299", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] } ] } \ No newline at end of file diff --git a/CVE-2009/CVE-2009-05xx/CVE-2009-0557.json b/CVE-2009/CVE-2009-05xx/CVE-2009-0557.json index d3a1bed9edc..9052938a525 100644 --- a/CVE-2009/CVE-2009-05xx/CVE-2009-0557.json +++ b/CVE-2009/CVE-2009-05xx/CVE-2009-0557.json @@ -2,8 +2,9 @@ "id": "CVE-2009-0557", "sourceIdentifier": "secure@microsoft.com", "published": "2009-06-10T18:30:00.203", - "lastModified": "2018-10-12T21:50:37.457", - "vulnStatus": "Modified", + "lastModified": "2024-06-28T14:15:47.220", + "vulnStatus": "Analyzed", + "cveTags": [], "cisaExploitAdd": "2022-06-08", "cisaActionDue": "2022-06-22", "cisaRequiredAction": "Apply updates per vendor instructions.", @@ -19,6 +20,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -66,13 +89,33 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:office:2004:*:mac:*:*:*:*:*", - "matchCriteriaId": "9409A9BD-1E9B-49B8-884F-8FE569D8AA25" + "criteria": "cpe:2.3:a:microsoft:office:2000:sp3:*:*:*:*:*:*", + "matchCriteriaId": "4891122F-AD7F-45E6-98C6-833227916F6B" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:office:2008:*:mac:*:*:*:*:*", - "matchCriteriaId": "5BA91840-371C-4282-9F7F-B393F785D260" + "criteria": "cpe:2.3:a:microsoft:office:2003:sp3:*:*:*:*:*:*", + "matchCriteriaId": "A332D04D-CC8C-4F68-A261-BA2F2D8EAD1E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:office:2004:*:*:*:*:macos:*:*", + "matchCriteriaId": "0B191155-67F2-4C6E-BD0C-AF5AF6F04BA1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:office:2007:sp1:*:*:*:*:*:*", + "matchCriteriaId": "69E6B9EB-D3F7-4C57-BF2F-61664E5C2C7D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:office:2007:sp2:*:*:*:*:*:*", + "matchCriteriaId": "08AF794A-435D-4171-9DBB-EB7FAED96DBA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:office:2008:*:*:*:*:macos:*:*", + "matchCriteriaId": "421ACF1B-1B21-4416-98ED-BAA5C210EAE5" }, { "vulnerable": true, @@ -81,38 +124,8 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:office_compatibility_pack_for_word_excel_ppt_2007:*:sp1:*:*:*:*:*:*", - "matchCriteriaId": "34C5FEAD-4B4B-44EB-9F3A-05093347A2F1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:office_compatibility_pack_for_word_excel_ppt_2007:*:sp2:*:*:*:*:*:*", - "matchCriteriaId": "3382DE96-A3CD-4094-9828-2955472BBE2D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:office_excel:2000:sp3:*:*:*:*:*:*", - "matchCriteriaId": "806086B6-AB83-4008-A1A2-73BC35A95925" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:office_excel:2003:sp3:*:*:*:*:*:*", - "matchCriteriaId": "AD22DBA8-40B0-4197-9D56-38D5D9E1ED89" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:office_excel:2007:sp1:*:*:*:*:*:*", - "matchCriteriaId": "297A9F48-13DF-4042-AC21-B8B764B217BE" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:office_excel:2007:sp2:*:*:*:*:*:*", - "matchCriteriaId": "F03E302A-83DE-46FF-9044-09230841BD2A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:office_excel_viewer:*:*:*:*:*:*:*:*", - "matchCriteriaId": "4A2613CE-C469-43AE-A590-87CE1FAADA8B" + "criteria": "cpe:2.3:a:microsoft:office_excel_viewer:-:*:*:*:*:*:*:*", + "matchCriteriaId": "940DEFD7-4281-46A9-9962-4E15048EB22C" }, { "vulnerable": true, @@ -121,28 +134,13 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:office_sharepoint_server:2007:sp1:x32:*:*:*:*:*", - "matchCriteriaId": "E013CE59-0ABF-4542-A9E9-D295AA0FC2A2" + "criteria": "cpe:2.3:a:microsoft:office_sharepoint_server:2007:sp1:*:*:*:*:*:*", + "matchCriteriaId": "F007E987-9CCF-4786-AB23-C5F4AE51D5A6" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:office_sharepoint_server:2007:sp1:x64:*:*:*:*:*", - "matchCriteriaId": "C0AEECDD-BBD0-4042-8A47-D66670A6DC6E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:office_sharepoint_server:2007:sp2:x32:*:*:*:*:*", - "matchCriteriaId": "91A3E58F-E2FE-4346-9083-58C963171A73" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:office_sharepoint_server:2007:sp2:x64:*:*:*:*:*", - "matchCriteriaId": "6BE07062-6299-4371-BD74-BA7F7840DBA8" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:open_xml_file_format_converter:*:*:mac:*:*:*:*:*", - "matchCriteriaId": "3807A4E4-EB58-47B6-AD98-6ED464DEBA4E" + "criteria": "cpe:2.3:a:microsoft:office_sharepoint_server:2007:sp2:*:*:*:*:*:*", + "matchCriteriaId": "875D8BED-E54F-4C54-9071-A3BAAF4493A5" } ] } @@ -152,34 +150,59 @@ "references": [ { "url": "http://osvdb.org/54953", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.securityfocus.com/bid/35241", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.securitytracker.com/id?1022351", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.us-cert.gov/cas/techalerts/TA09-160A.html", "source": "secure@microsoft.com", "tags": [ + "Broken Link", + "Third Party Advisory", "US Government Resource" ] }, { "url": "http://www.vupen.com/english/advisories/2009/1540", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-021", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] }, { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5564", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Broken Link" + ] } ] } \ No newline at end of file diff --git a/CVE-2009/CVE-2009-05xx/CVE-2009-0563.json b/CVE-2009/CVE-2009-05xx/CVE-2009-0563.json index 9aab7e51fa7..42411027680 100644 --- a/CVE-2009/CVE-2009-05xx/CVE-2009-0563.json +++ b/CVE-2009/CVE-2009-05xx/CVE-2009-0563.json @@ -2,8 +2,9 @@ "id": "CVE-2009-0563", "sourceIdentifier": "secure@microsoft.com", "published": "2009-06-10T18:00:00.313", - "lastModified": "2018-10-12T21:50:43.147", - "vulnStatus": "Modified", + "lastModified": "2024-06-28T14:15:58.267", + "vulnStatus": "Analyzed", + "cveTags": [], "cisaExploitAdd": "2022-06-08", "cisaActionDue": "2022-06-22", "cisaRequiredAction": "Apply updates per vendor instructions.", @@ -19,6 +20,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -52,7 +75,7 @@ "description": [ { "lang": "en", - "value": "CWE-119" + "value": "CWE-787" } ] } @@ -66,53 +89,53 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:office:2004:*:mac:*:*:*:*:*", - "matchCriteriaId": "9409A9BD-1E9B-49B8-884F-8FE569D8AA25" + "criteria": "cpe:2.3:a:microsoft:office:2000:sp3:*:*:*:*:*:*", + "matchCriteriaId": "4891122F-AD7F-45E6-98C6-833227916F6B" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:office:2008:*:mac:*:*:*:*:*", - "matchCriteriaId": "5BA91840-371C-4282-9F7F-B393F785D260" + "criteria": "cpe:2.3:a:microsoft:office:2003:sp3:*:*:*:*:*:*", + "matchCriteriaId": "A332D04D-CC8C-4F68-A261-BA2F2D8EAD1E" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:office_compatibility_pack_for_word_excel_ppt_2007:*:sp1:*:*:*:*:*:*", - "matchCriteriaId": "34C5FEAD-4B4B-44EB-9F3A-05093347A2F1" + "criteria": "cpe:2.3:a:microsoft:office:2004:*:*:*:*:macos:*:*", + "matchCriteriaId": "0B191155-67F2-4C6E-BD0C-AF5AF6F04BA1" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:office_compatibility_pack_for_word_excel_ppt_2007:*:sp2:*:*:*:*:*:*", - "matchCriteriaId": "3382DE96-A3CD-4094-9828-2955472BBE2D" + "criteria": "cpe:2.3:a:microsoft:office:2007:sp1:*:*:*:*:*:*", + "matchCriteriaId": "69E6B9EB-D3F7-4C57-BF2F-61664E5C2C7D" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:office_word:2000:sp3:*:*:*:*:*:*", - "matchCriteriaId": "C1B2B207-751F-4596-B805-B4622E312B93" + "criteria": "cpe:2.3:a:microsoft:office:2007:sp2:*:*:*:*:*:*", + "matchCriteriaId": "08AF794A-435D-4171-9DBB-EB7FAED96DBA" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:office_word:2002:sp3:*:*:*:*:*:*", - "matchCriteriaId": "0E99B12F-0DB7-4D0F-AD54-DD906CC8E3BD" + "criteria": "cpe:2.3:a:microsoft:office:2008:*:*:*:*:macos:*:*", + "matchCriteriaId": "421ACF1B-1B21-4416-98ED-BAA5C210EAE5" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:office_word:2003:sp3:*:*:*:*:*:*", - "matchCriteriaId": "CDA5243A-BA58-41BC-8FFC-317239E511C2" + "criteria": "cpe:2.3:a:microsoft:office:xp:sp3:*:*:*:*:*:*", + "matchCriteriaId": "79BA1175-7F02-4435-AEA6-1BA8AADEB7EF" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:office_word:2007:sp1:*:*:*:*:*:*", - "matchCriteriaId": "413DBB72-E807-46EC-AD7B-4D62C6217CCB" + "criteria": "cpe:2.3:a:microsoft:office_compatibility_pack:2007:sp1:*:*:*:*:*:*", + "matchCriteriaId": "C5C94F2C-786B-45E4-B80A-FC668D917014" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:office_word:2007:sp2:*:*:*:*:*:*", - "matchCriteriaId": "0B3ECA7D-1B9B-44EF-B76C-01CB36CCC33E" + "criteria": "cpe:2.3:a:microsoft:office_compatibility_pack:2007:sp2:*:*:*:*:*:*", + "matchCriteriaId": "A4B44889-AEEB-4713-A047-C27B802DB257" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:office_word_viewer:*:*:*:*:*:*:*:*", - "matchCriteriaId": "E647A7B3-7A92-4584-BDA7-81752FF59411" + "criteria": "cpe:2.3:a:microsoft:office_word_viewer:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C64B2636-8F96-48BA-921F-A8FA0E62DE63" }, { "vulnerable": true, @@ -121,8 +144,8 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:open_xml_file_format_converter:*:*:mac:*:*:*:*:*", - "matchCriteriaId": "3807A4E4-EB58-47B6-AD98-6ED464DEBA4E" + "criteria": "cpe:2.3:a:microsoft:open_xml_file_format_converter:-:*:*:*:*:macos:*:*", + "matchCriteriaId": "4BC69733-551E-4535-B851-4A3EF71E98CD" } ] } @@ -132,42 +155,76 @@ "references": [ { "url": "http://osvdb.org/54959", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.securityfocus.com/archive/1/504204/100/0/threaded", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.securityfocus.com/bid/35188", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.securitytracker.com/id?1022356", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.us-cert.gov/cas/techalerts/TA09-160A.html", "source": "secure@microsoft.com", "tags": [ + "Broken Link", + "Third Party Advisory", "US Government Resource" ] }, { "url": "http://www.vupen.com/english/advisories/2009/1546", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.zerodayinitiative.com/advisories/ZDI-09-035", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-027", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] }, { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6133", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Broken Link" + ] } ] } \ No newline at end of file diff --git a/CVE-2009/CVE-2009-18xx/CVE-2009-1862.json b/CVE-2009/CVE-2009-18xx/CVE-2009-1862.json index 0fa60713bc0..674a9d351de 100644 --- a/CVE-2009/CVE-2009-18xx/CVE-2009-1862.json +++ b/CVE-2009/CVE-2009-18xx/CVE-2009-1862.json @@ -2,8 +2,9 @@ "id": "CVE-2009-1862", "sourceIdentifier": "cve@mitre.org", "published": "2009-07-23T20:30:00.233", - "lastModified": "2009-09-16T05:31:35.203", - "vulnStatus": "Modified", + "lastModified": "2024-06-28T14:20:12.417", + "vulnStatus": "Analyzed", + "cveTags": [], "evaluatorImpact": "Per: http://www.kb.cert.org/vuls/id/259425\r\n\r\n\"Adobe Flash is a widely deployed multimedia platform typically used to provide content in web sites. Adobe Flash Player, Reader, Acrobat, and other Adobe products include Flash support.\r\n\r\nAdobe Flash Player contains a code execution vulnerability. An attacker may be able to trigger this vulnerability by convincing a user to open a specially crafted Flash (SWF) file. The SWF file could be hosted or embedded in a web page or contained in a Portable Document Format (PDF) file. If an attacker can take control of a website or web server, trusted sites may exploit this vulnerability.\r\n\r\nThis vulnerability affects Adobe Flash versions 9.0.159.0 and 10.0.22.87 and earlier 9.x and 10.x versions. Adobe Reader 9, Acrobat 9, and other Adobe products (including Photoshop CS3, PhotoShop Lightroom, Freehand MX, Fireworks) provide Flash support independent of Flash Player. As of 2009-07-22, Adobe Reader 9.1.2 includes Flash 9.0.155.0, which is likely vulnerable to issues addressed by Flash 9.0.159.0\"", "cisaExploitAdd": "2022-06-08", "cisaActionDue": "2022-06-22", @@ -20,6 +21,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -53,7 +76,7 @@ "description": [ { "lang": "en", - "value": "CWE-94" + "value": "CWE-787" } ] } @@ -67,43 +90,17 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:9.0:*:*:*:*:*:*:*", - "matchCriteriaId": "5AA53564-9ACD-4CFB-9AAC-A77440026A57" + "criteria": "cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*", + "versionStartIncluding": "9.0", + "versionEndIncluding": "9.1.2", + "matchCriteriaId": "B9BDD6C1-0E21-40D1-9C94-C8D79F6AA217" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:9.1:*:*:*:*:*:*:*", - "matchCriteriaId": "C7EC46E3-77B7-4455-B3E0-A45C6B69B3DC" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:9.1.1:*:*:*:*:*:*:*", - "matchCriteriaId": "4F475858-DCE2-4C93-A51A-04718DF17593" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:9.1.2:*:*:*:*:*:*:*", - "matchCriteriaId": "88687272-4CD0-42A2-B727-C322ABDE3549" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:9.0:*:*:*:*:*:*:*", - "matchCriteriaId": "562772F1-1627-438E-A6B8-7D1AA5536086" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:9.1:*:*:*:*:*:*:*", - "matchCriteriaId": "27D5AF92-A8E1-41BD-B20A-EB26BB6AD4DE" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:9.1.1:*:*:*:*:*:*:*", - "matchCriteriaId": "F25C9167-C6D4-4264-9197-50878EDA2D96" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:9.1.2:*:*:*:*:*:*:*", - "matchCriteriaId": "DD1D7308-09E9-42B2-8836-DC2326C62A9E" + "criteria": "cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:*", + "versionStartIncluding": "9.0", + "versionEndIncluding": "9.1.2", + "matchCriteriaId": "D3D940BB-0388-471A-9691-CABE00466068" } ] } @@ -117,113 +114,17 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:9.0.16:*:*:*:*:*:*:*", - "matchCriteriaId": "F35F86B6-D49A-40F4-BFFA-5D6BBA2F7D8B" + "criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", + "versionStartIncluding": "9.0", + "versionEndIncluding": "9.0.159.0", + "matchCriteriaId": "452F2EAC-9EFB-4899-8F2F-A1EE2B796BEE" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:9.0.18d60:*:*:*:*:*:*:*", - "matchCriteriaId": "600DDA9D-6440-48D1-8539-7127398A8678" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:9.0.20:*:*:*:*:*:*:*", - "matchCriteriaId": "B4D5E27C-F6BF-4F84-9B83-6AEC98B4AA14" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:9.0.20.0:*:*:*:*:*:*:*", - "matchCriteriaId": "934A869D-D58D-4C36-B86E-013F62790585" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:9.0.28:*:*:*:*:*:*:*", - "matchCriteriaId": "ACFA6611-99DA-48B0-89F7-DD99B8E30334" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:9.0.28.0:*:*:*:*:*:*:*", - "matchCriteriaId": "59AF804B-BD7A-4AD7-AD44-B5D980443B8B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:9.0.31:*:*:*:*:*:*:*", - "matchCriteriaId": "F5D52F86-2E38-4C66-9939-7603367B8D0E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:9.0.31.0:*:*:*:*:*:*:*", - "matchCriteriaId": "0557AA2A-FA3A-460A-8F03-DC74B149CA3D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:9.0.45.0:*:*:*:*:*:*:*", - "matchCriteriaId": "2FC04ABF-6191-4AA5-90B2-E7A97E6C6005" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:9.0.47.0:*:*:*:*:*:*:*", - "matchCriteriaId": "F22F1B02-CCF5-4770-A79B-1F58CA4321CE" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:9.0.48.0:*:*:*:*:*:*:*", - "matchCriteriaId": "93957171-F1F4-43ED-A8B9-2D36C81EB1F9" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:9.0.112.0:*:*:*:*:*:*:*", - "matchCriteriaId": "7AE89894-E492-4380-8A2B-4CDD3A15667A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:9.0.114.0:*:*:*:*:*:*:*", - "matchCriteriaId": "1C6ED706-BAF2-4795-B597-6F7EE8CA8911" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:9.0.115.0:*:*:*:*:*:*:*", - "matchCriteriaId": "260E2CF6-4D15-4168-A933-3EC52D8F93FF" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:9.0.124.0:*:*:*:*:*:*:*", - "matchCriteriaId": "D50BF190-2629-49A8-A377-4723C93FFB3E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:9.0.155.0:*:*:*:*:*:*:*", - "matchCriteriaId": "BDD0A103-6D00-4D3D-9570-2DF74B6FE294" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:9.0.159.0:*:*:*:*:*:*:*", - "matchCriteriaId": "33AC4365-576C-487A-89C5-197A26D416C4" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:9.125.0:*:*:*:*:*:*:*", - "matchCriteriaId": "FE848097-01E6-4C9B-9593-282D55CC77D9" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:10.0.0.584:*:*:*:*:*:*:*", - "matchCriteriaId": "08E4028B-72E7-4E4A-AD0F-645F5AACAA29" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:10.0.12.10:*:*:*:*:*:*:*", - "matchCriteriaId": "63313ADA-3C52-47C8-9745-6BF6AEF0F6AD" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:10.0.12.36:*:*:*:*:*:*:*", - "matchCriteriaId": "BA646396-7C10-45A0-89A9-C75C5D8AFB3E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:10.0.22.87:*:*:*:*:*:*:*", - "matchCriteriaId": "3555324F-40F8-4BF4-BE5F-52A1E22B3AFA" + "criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0", + "versionEndIncluding": "10.0.22.87", + "matchCriteriaId": "5113E8EC-D47F-4BAE-855E-915FA8870AE1" } ] } @@ -235,87 +136,147 @@ "url": "http://blogs.adobe.com/psirt/2009/07/potential_adobe_reader_and_fla.html", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Vendor Advisory" ] }, { "url": "http://bugs.adobe.com/jira/browse/FP-1265", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://isc.sans.org/diary.html?storyid=6847", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Not Applicable" + ] }, { "url": "http://lists.apple.com/archives/security-announce/2009/Sep/msg00003.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://lists.apple.com/archives/security-announce/2009/Sep/msg00004.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://news.cnet.com/8301-27080_3-10293389-245.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://secunia.com/advisories/36193", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://secunia.com/advisories/36374", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://secunia.com/advisories/36701", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://security.gentoo.org/glsa/glsa-200908-04.xml", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-266108-1", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://support.apple.com/kb/HT3864", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://support.apple.com/kb/HT3865", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://www.adobe.com/support/security/advisories/apsa09-03.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "http://www.adobe.com/support/security/bulletins/apsb09-10.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Not Applicable" + ] }, { "url": "http://www.adobe.com/support/security/bulletins/apsb09-13.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Not Applicable" + ] }, { "url": "http://www.kb.cert.org/vuls/id/259425", "source": "cve@mitre.org", "tags": [ + "Third Party Advisory", "US Government Resource" ] }, { "url": "http://www.securityfocus.com/bid/35759", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.symantec.com/business/security_response/writeup.jsp?docid=2009-072209-2512-99", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.symantec.com/connect/blogs/next-generation-flash-vulnerability", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] } ] } \ No newline at end of file diff --git a/CVE-2009/CVE-2009-39xx/CVE-2009-3953.json b/CVE-2009/CVE-2009-39xx/CVE-2009-3953.json index 409d60aabf9..639faee20e0 100644 --- a/CVE-2009/CVE-2009-39xx/CVE-2009-3953.json +++ b/CVE-2009/CVE-2009-39xx/CVE-2009-3953.json @@ -2,8 +2,9 @@ "id": "CVE-2009-3953", "sourceIdentifier": "psirt@adobe.com", "published": "2010-01-13T19:30:00.343", - "lastModified": "2018-10-30T16:25:16.967", - "vulnStatus": "Modified", + "lastModified": "2024-06-28T14:20:25.363", + "vulnStatus": "Analyzed", + "cveTags": [], "evaluatorImpact": "Per: http://www.adobe.com/support/security/bulletins/apsb10-02.html\r\n\r\nAffected software versions:\r\n\r\nAdobe Reader 9.2 and earlier versions for Windows, Macintosh, and UNIX\r\nAdobe Acrobat 9.2 and earlier versions for Windows and Macintosh", "cisaExploitAdd": "2022-06-08", "cisaActionDue": "2022-06-22", @@ -20,6 +21,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -53,7 +76,7 @@ "description": [ { "lang": "en", - "value": "CWE-119" + "value": "CWE-787" } ] } @@ -69,238 +92,23 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*", - "versionEndIncluding": "9.2", - "matchCriteriaId": "C42D46A5-DB0B-48EF-8587-C2CEDAA14A4A" + "versionStartIncluding": "7.0", + "versionEndExcluding": "7.1.4", + "matchCriteriaId": "C1329474-A9CD-44C3-828C-A0D53418300B" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:3.0:*:*:*:*:*:*:*", - "matchCriteriaId": "465F9134-DD86-4F13-8C39-949BE6E7389A" + "criteria": "cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.0", + "versionEndExcluding": "8.2", + "matchCriteriaId": "9670133C-09FA-41F2-B0F7-BFE960E30B71" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:3.1:*:*:*:*:*:*:*", - "matchCriteriaId": "BB041EDF-EFF8-4AA6-8D59-411975547534" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:4.0:*:*:*:*:*:*:*", - "matchCriteriaId": "4C05F6A5-0FB3-489B-9B8B-64C569C03D7A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:4.0.5:*:*:*:*:*:*:*", - "matchCriteriaId": "AABA4FE3-662B-4956-904D-45086E000890" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:4.0.5a:*:*:*:*:*:*:*", - "matchCriteriaId": "998CD79C-458E-46A8-8261-1C40C53D9FA5" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:4.0.5c:*:*:*:*:*:*:*", - "matchCriteriaId": "0155FB0B-7FAD-4388-96C8-A8543B4FDFD9" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:5.0:*:*:*:*:*:*:*", - "matchCriteriaId": "201F059D-33D1-4D9F-9C6F-FC8EB49E4735" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:5.0.5:*:*:*:*:*:*:*", - "matchCriteriaId": "B025E795-5713-485E-8A15-EBE4451A1A46" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:5.0.6:*:*:*:*:*:*:*", - "matchCriteriaId": "B453FA1D-0FE9-4324-9644-E167561926C2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:5.0.10:*:*:*:*:*:*:*", - "matchCriteriaId": "FDEA946E-B6D2-463B-89D0-F2F37278089E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:6.0:*:*:*:*:*:*:*", - "matchCriteriaId": "183B5940-2310-4D2E-99F0-9792A801A442" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:6.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "4F8BB13E-2732-4F9E-A588-EA1C00893C8B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:6.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "E5FCDCBF-597B-439C-8D8B-2819FC70C567" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:6.0.3:*:*:*:*:*:*:*", - "matchCriteriaId": "440B890A-90E9-4456-B92A-856CD17F0C78" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:6.0.4:*:*:*:*:*:*:*", - "matchCriteriaId": "79BD9D8D-39DA-403E-915D-E1B6A46A6BAB" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:6.0.5:*:*:*:*:*:*:*", - "matchCriteriaId": "8976A7DC-1314-4C4A-A7C5-AA789D2DAB9C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:6.0.6:*:*:*:*:*:*:*", - "matchCriteriaId": "37854E7C-2166-48D7-AE8C-44C9468C38C7" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:7.0:*:*:*:*:*:*:*", - "matchCriteriaId": "FECFC942-4F04-420C-A9B4-AE0C0590317F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:7.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "F81817F2-1E3A-4A52-88F1-6B614A2A1F0A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:7.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "CFFFFF0D-A80F-4B67-BEE2-86868EF7AA37" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:7.0.3:*:*:*:*:*:*:*", - "matchCriteriaId": "1DC97A87-2652-4AD6-8E10-419A9AC9C245" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:7.0.4:*:*:*:*:*:*:*", - "matchCriteriaId": "3E1F71AE-3591-499E-B09F-AAC4E38F1CF2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:7.0.5:*:*:*:*:*:*:*", - "matchCriteriaId": "2D75174C-EBF9-4117-9E66-80E847012853" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:7.0.6:*:*:*:*:*:*:*", - "matchCriteriaId": "69B0305A-51D3-4E09-B96C-54B0ED921DA3" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:7.0.7:*:*:*:*:*:*:*", - "matchCriteriaId": "9762FE57-837B-4FFA-9813-AC038450EB2B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:7.0.8:*:*:*:*:*:*:*", - "matchCriteriaId": "0055A38C-E421-40A1-8BC7-11856A20B8F0" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:7.0.9:*:*:*:*:*:*:*", - "matchCriteriaId": "758CC9EE-8929-405B-A845-83BAAECCB2AD" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:7.1.0:*:*:*:*:*:*:*", - "matchCriteriaId": "24A7CF98-27EC-406A-98E2-ACC1AAAF5C93" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:7.1.1:*:*:*:*:*:*:*", - "matchCriteriaId": "BC1BD70D-7A92-4309-A40C-9BD500997390" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:7.1.2:*:*:*:*:*:*:*", - "matchCriteriaId": "F9C17896-8895-4731-B77A-F488A94F0CBD" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:7.1.3:*:*:*:*:*:*:*", - "matchCriteriaId": "21AC1961-12F7-456F-9CE4-9AAF116CF141" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:7.1.4:*:*:*:*:*:*:*", - "matchCriteriaId": "DF9F1050-B6BE-4B99-882B-36D6E187304D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:8.0:*:*:*:*:*:*:*", - "matchCriteriaId": "26AE76F7-D7F6-4AF2-A5C6-708B5642C288" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:8.1:*:*:*:*:*:*:*", - "matchCriteriaId": "749FFB51-65D4-4A4B-95F3-742440276897" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:8.1.1:*:*:*:*:*:*:*", - "matchCriteriaId": "C8665E53-EC1E-4B95-9064-2565BC12113E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:8.1.2:*:*:*:*:*:*:*", - "matchCriteriaId": "24218FDA-F9DA-465A-B5D5-76A55C7EE04E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:8.1.3:*:*:*:*:*:*:*", - "matchCriteriaId": "E2C5F1C5-85CD-47B9-897F-E51D6902AF72" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:8.1.4:*:*:*:*:*:*:*", - "matchCriteriaId": "E0E190FF-3EBC-44AB-8072-4D964E843E8A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:8.1.5:*:*:*:*:*:*:*", - "matchCriteriaId": "6A624D44-C135-4ED3-9BA4-F4F8A044850B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:8.1.6:*:*:*:*:*:*:*", - "matchCriteriaId": "B95C0A99-42E4-40A9-BF61-507E4E4DC052" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:8.1.7:*:*:*:*:*:*:*", - "matchCriteriaId": "3B9F55CC-3681-4A67-99D1-3F40447392D5" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:9.0:*:*:*:*:*:*:*", - "matchCriteriaId": "5AA53564-9ACD-4CFB-9AAC-A77440026A57" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:9.1:*:*:*:*:*:*:*", - "matchCriteriaId": "C7EC46E3-77B7-4455-B3E0-A45C6B69B3DC" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:9.1.1:*:*:*:*:*:*:*", - "matchCriteriaId": "4F475858-DCE2-4C93-A51A-04718DF17593" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:9.1.2:*:*:*:*:*:*:*", - "matchCriteriaId": "88687272-4CD0-42A2-B727-C322ABDE3549" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:9.1.3:*:*:*:*:*:*:*", - "matchCriteriaId": "1E5C4FA4-3786-47AF-BD7D-8E75927EB3AA" + "criteria": "cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*", + "versionStartIncluding": "9.0", + "versionEndExcluding": "9.3", + "matchCriteriaId": "EA95CC75-BF25-4BEB-B646-ACDBBE32AF4F" } ] }, @@ -310,20 +118,19 @@ "cpeMatch": [ { "vulnerable": false, - "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", - "matchCriteriaId": "0FF5999A-9D12-4CDD-8DE9-A89C10B2D574" + "criteria": "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4781BF1E-8A4E-4AFF-9540-23D523EE30DD" }, { "vulnerable": false, - "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", - "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256" + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" } ] } ] }, { - "operator": "AND", "nodes": [ { "operator": "OR", @@ -331,275 +138,28 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:*", - "versionEndIncluding": "9.2", - "matchCriteriaId": "E7BDB18D-A53C-4252-B2ED-42E6F3609277" + "criteria": "cpe:2.3:a:suse:linux_enterprise_debuginfo:11:-:*:*:*:*:*:*", + "matchCriteriaId": "C76D0C17-2AFF-4209-BBCD-36166DF7F974" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:3.0:*:*:*:*:*:*:*", - "matchCriteriaId": "B1C92642-7C8D-411A-8726-06A8A6483D65" + "criteria": "cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*", + "matchCriteriaId": "FBF7B6A8-3DF9-46EC-A90E-6EF68C39F883" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:3.01:*:*:*:*:*:*:*", - "matchCriteriaId": "3CBE2E6C-AF0E-4A77-9EB0-3593889BC676" + "criteria": "cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*", + "matchCriteriaId": "A01C8B7E-EB19-40EA-B1D2-9AE5EA536C95" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:3.02:*:*:*:*:*:*:*", - "matchCriteriaId": "4B5C5C14-383C-4630-858E-D40D6C32FD4B" + "criteria": "cpe:2.3:o:suse:linux_enterprise:10.0:sp2:*:*:*:*:*:*", + "matchCriteriaId": "6A3B50EE-F432-40BE-B422-698955A6058D" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:4.0:*:*:*:*:*:*:*", - "matchCriteriaId": "F509566A-6D4A-40C0-8A16-F8765C5DCAAF" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:4.0.5:*:*:*:*:*:*:*", - "matchCriteriaId": "707D7124-6063-4510-80B4-AD9675996F67" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:4.0.5a:*:*:*:*:*:*:*", - "matchCriteriaId": "200FFAE3-CC1C-4A11-99AD-377D54A67195" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:4.0.5c:*:*:*:*:*:*:*", - "matchCriteriaId": "8A990E86-07C0-49E2-92D6-55E499F30FAE" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:4.5:*:*:*:*:*:*:*", - "matchCriteriaId": "6AED985D-60D7-489E-9F1E-CE3C9D985B7A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:5.0:*:*:*:*:*:*:*", - "matchCriteriaId": "5F0FCA2F-FD7F-4CE5-9D45-324A7EC45105" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:5.0.5:*:*:*:*:*:*:*", - "matchCriteriaId": "EF7EAA22-CED2-4379-9465-9562BACB1C20" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:5.0.6:*:*:*:*:*:*:*", - "matchCriteriaId": "35B1CA6B-600C-4E03-B4D5-3D7E1BC4D0F9" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:5.0.7:*:*:*:*:*:*:*", - "matchCriteriaId": "F7AA1BA3-9FFA-46AB-A92A-7247D5F7EA06" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:5.0.9:*:*:*:*:*:*:*", - "matchCriteriaId": "3F5F7424-1E19-4078-8908-CD86A0185042" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:5.0.10:*:*:*:*:*:*:*", - "matchCriteriaId": "F2402B40-6B72-48B5-A376-DA8D16CA43FA" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:5.0.11:*:*:*:*:*:*:*", - "matchCriteriaId": "0D968113-340A-4E5A-B4FD-D9702D49E3DC" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:5.1:*:*:*:*:*:*:*", - "matchCriteriaId": "ACF742B8-5F7A-487B-835C-756B1BB392F4" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:6.0:*:*:*:*:*:*:*", - "matchCriteriaId": "C0BB7C0C-B1D6-4733-BA91-022A1A7FB2E2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:6.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "0B131DB8-4B6A-4AF2-8D5E-B5EA1AEBFB3B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:6.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "5B9351C2-16ED-4766-B417-8DB3A8766C2F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:6.0.3:*:*:*:*:*:*:*", - "matchCriteriaId": "74667860-0047-40AD-9468-860591BA9D17" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:6.0.4:*:*:*:*:*:*:*", - "matchCriteriaId": "5DEA092A-5532-4DCC-B43D-7A8ECF07FA4C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:6.0.5:*:*:*:*:*:*:*", - "matchCriteriaId": "9628AFF9-6EE1-4E85-858F-AE96EE64B7F4" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:7.0:*:*:*:*:*:*:*", - "matchCriteriaId": "6E2D0266-6954-4DBA-9EEE-8BF73B39DD61" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:7.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "24262AFA-2EC8-479E-8922-36DB4243E404" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:7.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "F1E62096-08B2-4722-A492-11E9A441E85B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:7.0.3:*:*:*:*:*:*:*", - "matchCriteriaId": "C5370AC6-90EE-48EA-8DBD-54002B102F7C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:7.0.4:*:*:*:*:*:*:*", - "matchCriteriaId": "C36D10A8-D211-437D-98D8-9029D0A9CF8B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:7.0.5:*:*:*:*:*:*:*", - "matchCriteriaId": "BA55D00C-3629-48E4-8699-F62B8D703E02" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:7.0.6:*:*:*:*:*:*:*", - "matchCriteriaId": "0EE5E1B7-7B91-4AE1-92AA-4F1763E1BA1E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:7.0.7:*:*:*:*:*:*:*", - "matchCriteriaId": "623324C2-C8B5-4C3C-9C10-9677D5A6740A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:7.0.8:*:*:*:*:*:*:*", - "matchCriteriaId": "B8EAF5E3-F3B4-4AD3-B5F1-281AB0F9C57F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:7.0.9:*:*:*:*:*:*:*", - "matchCriteriaId": "634396D6-4ED6-4F4D-9458-396373489589" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:7.1.0:*:*:*:*:*:*:*", - "matchCriteriaId": "9A265869-EF58-428E-B8BB-30CABCBE0A83" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:7.1.1:*:*:*:*:*:*:*", - "matchCriteriaId": "ADB421CD-85DE-4495-93B7-46708449AE27" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:7.1.2:*:*:*:*:*:*:*", - "matchCriteriaId": "32049561-270C-4B18-9E96-EA0F66ACECAA" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:7.1.3:*:*:*:*:*:*:*", - "matchCriteriaId": "5491D310-E1C0-4FCB-9DCA-97CA1F95D4BA" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:8.0:*:*:*:*:*:*:*", - "matchCriteriaId": "996EB48E-D2A8-49E4-915A-EBDE26A9FB94" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:8.1:*:*:*:*:*:*:*", - "matchCriteriaId": "97E20936-EE31-4CEB-A710-3165A28BAD69" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:8.1.1:*:*:*:*:*:*:*", - "matchCriteriaId": "5BD9952C-A1D0-4DFB-A292-9B86D7EAE5FD" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:8.1.2:*:*:*:*:*:*:*", - "matchCriteriaId": "C5BEA847-A71E-4336-AB67-B3C38847C1C3" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:8.1.4:*:*:*:*:*:*:*", - "matchCriteriaId": "39F6994B-6969-485B-9286-2592B11A47BF" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:8.1.5:*:*:*:*:*:*:*", - "matchCriteriaId": "FC533775-B52E-43F0-BF19-1473BE36232D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:8.1.6:*:*:*:*:*:*:*", - "matchCriteriaId": "18D1C85E-42CC-46F2-A7B6-DAC3C3995330" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:8.1.7:*:*:*:*:*:*:*", - "matchCriteriaId": "C4670451-511E-496C-A78A-887366E1E992" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:9.0:*:*:*:*:*:*:*", - "matchCriteriaId": "562772F1-1627-438E-A6B8-7D1AA5536086" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:9.1:*:*:*:*:*:*:*", - "matchCriteriaId": "27D5AF92-A8E1-41BD-B20A-EB26BB6AD4DE" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:9.1.1:*:*:*:*:*:*:*", - "matchCriteriaId": "F25C9167-C6D4-4264-9197-50878EDA2D96" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:9.1.2:*:*:*:*:*:*:*", - "matchCriteriaId": "DD1D7308-09E9-42B2-8836-DC2326C62A9E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:9.1.3:*:*:*:*:*:*:*", - "matchCriteriaId": "B5C251D2-4C9B-4029-8BED-0FCAED3B8E89" - } - ] - }, - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": false, - "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", - "matchCriteriaId": "0FF5999A-9D12-4CDD-8DE9-A89C10B2D574" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", - "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:o:unix:unix:*:*:*:*:*:*:*:*", - "matchCriteriaId": "F7A7C398-5356-45D6-AA5C-53E63BC88DCA" + "criteria": "cpe:2.3:o:suse:linux_enterprise:10.0:sp3:*:*:*:*:*:*", + "matchCriteriaId": "1193A7E6-DCB4-4E79-A509-1D6948153A57" } ] } @@ -609,48 +169,79 @@ "references": [ { "url": "http://lists.opensuse.org/opensuse-security-announce/2010-01/msg00009.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://osvdb.org/61690", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Broken Link" + ] }, { "url": "http://secunia.com/advisories/38138", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Broken Link" + ] }, { "url": "http://secunia.com/advisories/38215", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.adobe.com/support/security/bulletins/apsb10-02.html", "source": "psirt@adobe.com", "tags": [ + "Not Applicable", "Patch", "Vendor Advisory" ] }, { "url": "http://www.metasploit.com/modules/exploit/windows/fileformat/adobe_u3d_meshdecl", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://www.redhat.com/support/errata/RHSA-2010-0060.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.securityfocus.com/bid/37758", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.securitytracker.com/id?1023446", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.us-cert.gov/cas/techalerts/TA10-013A.html", "source": "psirt@adobe.com", "tags": [ + "Third Party Advisory", "US Government Resource" ] }, @@ -658,20 +249,31 @@ "url": "http://www.vupen.com/english/advisories/2010/0103", "source": "psirt@adobe.com", "tags": [ + "Broken Link", "Vendor Advisory" ] }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=554293", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/55551", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8242", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Broken Link" + ] } ] } \ No newline at end of file diff --git a/CVE-2009/CVE-2009-43xx/CVE-2009-4324.json b/CVE-2009/CVE-2009-43xx/CVE-2009-4324.json index 49f2ccd64d8..f56005bb257 100644 --- a/CVE-2009/CVE-2009-43xx/CVE-2009-4324.json +++ b/CVE-2009/CVE-2009-43xx/CVE-2009-4324.json @@ -2,8 +2,9 @@ "id": "CVE-2009-4324", "sourceIdentifier": "psirt@adobe.com", "published": "2009-12-15T02:30:00.217", - "lastModified": "2018-10-30T16:25:16.967", - "vulnStatus": "Modified", + "lastModified": "2024-06-28T14:20:36.847", + "vulnStatus": "Analyzed", + "cveTags": [], "cisaExploitAdd": "2022-06-08", "cisaActionDue": "2022-06-22", "cisaRequiredAction": "Apply updates per vendor instructions.", @@ -19,6 +20,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -52,12 +75,67 @@ "description": [ { "lang": "en", - "value": "CWE-399" + "value": "CWE-416" } ] } ], "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.0", + "versionEndExcluding": "8.2", + "matchCriteriaId": "9670133C-09FA-41F2-B0F7-BFE960E30B71" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*", + "versionStartIncluding": "9.0", + "versionEndExcluding": "9.3", + "matchCriteriaId": "EA95CC75-BF25-4BEB-B646-ACDBBE32AF4F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.0", + "versionEndExcluding": "8.2", + "matchCriteriaId": "3A8B3441-727A-4A78-A5A4-5A5011075510" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:*", + "versionStartIncluding": "9.0", + "versionEndExcluding": "9.3", + "matchCriteriaId": "AADB6D5C-5448-4FF7-BB7B-3641EA56194E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4781BF1E-8A4E-4AFF-9540-23D523EE30DD" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + }, { "nodes": [ { @@ -65,306 +143,29 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*", - "versionEndIncluding": "9.2", - "matchCriteriaId": "C42D46A5-DB0B-48EF-8587-C2CEDAA14A4A" + "vulnerable": true, + "criteria": "cpe:2.3:a:suse:linux_enterprise_debuginfo:11:-:*:*:*:*:*:*", + "matchCriteriaId": "C76D0C17-2AFF-4209-BBCD-36166DF7F974" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:6.0:*:*:*:*:*:*:*", - "matchCriteriaId": "183B5940-2310-4D2E-99F0-9792A801A442" + "criteria": "cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*", + "matchCriteriaId": "FBF7B6A8-3DF9-46EC-A90E-6EF68C39F883" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:6.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "4F8BB13E-2732-4F9E-A588-EA1C00893C8B" + "criteria": "cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*", + "matchCriteriaId": "A01C8B7E-EB19-40EA-B1D2-9AE5EA536C95" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:6.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "E5FCDCBF-597B-439C-8D8B-2819FC70C567" + "criteria": "cpe:2.3:o:suse:linux_enterprise:10.0:sp2:*:*:*:*:*:*", + "matchCriteriaId": "6A3B50EE-F432-40BE-B422-698955A6058D" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:6.0.3:*:*:*:*:*:*:*", - "matchCriteriaId": "440B890A-90E9-4456-B92A-856CD17F0C78" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:6.0.4:*:*:*:*:*:*:*", - "matchCriteriaId": "79BD9D8D-39DA-403E-915D-E1B6A46A6BAB" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:6.0.5:*:*:*:*:*:*:*", - "matchCriteriaId": "8976A7DC-1314-4C4A-A7C5-AA789D2DAB9C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:7.0:*:*:*:*:*:*:*", - "matchCriteriaId": "FECFC942-4F04-420C-A9B4-AE0C0590317F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:7.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "F81817F2-1E3A-4A52-88F1-6B614A2A1F0A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:7.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "CFFFFF0D-A80F-4B67-BEE2-86868EF7AA37" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:7.0.3:*:*:*:*:*:*:*", - "matchCriteriaId": "1DC97A87-2652-4AD6-8E10-419A9AC9C245" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:7.0.4:*:*:*:*:*:*:*", - "matchCriteriaId": "3E1F71AE-3591-499E-B09F-AAC4E38F1CF2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:7.0.5:*:*:*:*:*:*:*", - "matchCriteriaId": "2D75174C-EBF9-4117-9E66-80E847012853" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:7.0.6:*:*:*:*:*:*:*", - "matchCriteriaId": "69B0305A-51D3-4E09-B96C-54B0ED921DA3" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:7.0.7:*:*:*:*:*:*:*", - "matchCriteriaId": "9762FE57-837B-4FFA-9813-AC038450EB2B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:7.0.8:*:*:*:*:*:*:*", - "matchCriteriaId": "0055A38C-E421-40A1-8BC7-11856A20B8F0" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:7.0.9:*:*:*:*:*:*:*", - "matchCriteriaId": "758CC9EE-8929-405B-A845-83BAAECCB2AD" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:8.0:*:*:*:*:*:*:*", - "matchCriteriaId": "26AE76F7-D7F6-4AF2-A5C6-708B5642C288" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:8.1:*:*:*:*:*:*:*", - "matchCriteriaId": "749FFB51-65D4-4A4B-95F3-742440276897" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:8.1.1:*:*:*:*:*:*:*", - "matchCriteriaId": "C8665E53-EC1E-4B95-9064-2565BC12113E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:8.1.2:*:*:*:*:*:*:*", - "matchCriteriaId": "24218FDA-F9DA-465A-B5D5-76A55C7EE04E" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:a:adobe:acrobat:9.0:*:*:*:*:*:*:*", - "matchCriteriaId": "5AA53564-9ACD-4CFB-9AAC-A77440026A57" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:a:adobe:acrobat:9.1:*:*:*:*:*:*:*", - "matchCriteriaId": "C7EC46E3-77B7-4455-B3E0-A45C6B69B3DC" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:*", - "versionEndIncluding": "9.2", - "matchCriteriaId": "E7BDB18D-A53C-4252-B2ED-42E6F3609277" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:3.0:*:*:*:*:*:*:*", - "matchCriteriaId": "B1C92642-7C8D-411A-8726-06A8A6483D65" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:4.0:*:*:*:*:*:*:*", - "matchCriteriaId": "F509566A-6D4A-40C0-8A16-F8765C5DCAAF" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:4.0.5:*:*:*:*:*:*:*", - "matchCriteriaId": "707D7124-6063-4510-80B4-AD9675996F67" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:4.0.5a:*:*:*:*:*:*:*", - "matchCriteriaId": "200FFAE3-CC1C-4A11-99AD-377D54A67195" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:4.0.5c:*:*:*:*:*:*:*", - "matchCriteriaId": "8A990E86-07C0-49E2-92D6-55E499F30FAE" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:4.5:*:*:*:*:*:*:*", - "matchCriteriaId": "6AED985D-60D7-489E-9F1E-CE3C9D985B7A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:5.0:*:*:*:*:*:*:*", - "matchCriteriaId": "5F0FCA2F-FD7F-4CE5-9D45-324A7EC45105" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:5.0.5:*:*:*:*:*:*:*", - "matchCriteriaId": "EF7EAA22-CED2-4379-9465-9562BACB1C20" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:5.0.6:*:*:*:*:*:*:*", - "matchCriteriaId": "35B1CA6B-600C-4E03-B4D5-3D7E1BC4D0F9" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:5.0.7:*:*:*:*:*:*:*", - "matchCriteriaId": "F7AA1BA3-9FFA-46AB-A92A-7247D5F7EA06" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:5.0.9:*:*:*:*:*:*:*", - "matchCriteriaId": "3F5F7424-1E19-4078-8908-CD86A0185042" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:5.0.10:*:*:*:*:*:*:*", - "matchCriteriaId": "F2402B40-6B72-48B5-A376-DA8D16CA43FA" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:5.0.11:*:*:*:*:*:*:*", - "matchCriteriaId": "0D968113-340A-4E5A-B4FD-D9702D49E3DC" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:5.1:*:*:*:*:*:*:*", - "matchCriteriaId": "ACF742B8-5F7A-487B-835C-756B1BB392F4" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:6.0:*:*:*:*:*:*:*", - "matchCriteriaId": "C0BB7C0C-B1D6-4733-BA91-022A1A7FB2E2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:6.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "0B131DB8-4B6A-4AF2-8D5E-B5EA1AEBFB3B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:6.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "5B9351C2-16ED-4766-B417-8DB3A8766C2F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:6.0.3:*:*:*:*:*:*:*", - "matchCriteriaId": "74667860-0047-40AD-9468-860591BA9D17" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:6.0.4:*:*:*:*:*:*:*", - "matchCriteriaId": "5DEA092A-5532-4DCC-B43D-7A8ECF07FA4C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:6.0.5:*:*:*:*:*:*:*", - "matchCriteriaId": "9628AFF9-6EE1-4E85-858F-AE96EE64B7F4" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:7.0:*:*:*:*:*:*:*", - "matchCriteriaId": "6E2D0266-6954-4DBA-9EEE-8BF73B39DD61" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:7.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "24262AFA-2EC8-479E-8922-36DB4243E404" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:7.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "F1E62096-08B2-4722-A492-11E9A441E85B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:7.0.3:*:*:*:*:*:*:*", - "matchCriteriaId": "C5370AC6-90EE-48EA-8DBD-54002B102F7C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:7.0.4:*:*:*:*:*:*:*", - "matchCriteriaId": "C36D10A8-D211-437D-98D8-9029D0A9CF8B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:7.0.5:*:*:*:*:*:*:*", - "matchCriteriaId": "BA55D00C-3629-48E4-8699-F62B8D703E02" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:7.0.6:*:*:*:*:*:*:*", - "matchCriteriaId": "0EE5E1B7-7B91-4AE1-92AA-4F1763E1BA1E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:7.0.7:*:*:*:*:*:*:*", - "matchCriteriaId": "623324C2-C8B5-4C3C-9C10-9677D5A6740A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:7.0.8:*:*:*:*:*:*:*", - "matchCriteriaId": "B8EAF5E3-F3B4-4AD3-B5F1-281AB0F9C57F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:7.0.9:*:*:*:*:*:*:*", - "matchCriteriaId": "634396D6-4ED6-4F4D-9458-396373489589" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:8.0:*:*:*:*:*:*:*", - "matchCriteriaId": "996EB48E-D2A8-49E4-915A-EBDE26A9FB94" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:8.1:*:*:*:*:*:*:*", - "matchCriteriaId": "97E20936-EE31-4CEB-A710-3165A28BAD69" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:8.1.1:*:*:*:*:*:*:*", - "matchCriteriaId": "5BD9952C-A1D0-4DFB-A292-9B86D7EAE5FD" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:8.1.2:*:*:*:*:*:*:*", - "matchCriteriaId": "C5BEA847-A71E-4336-AB67-B3C38847C1C3" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:9.0:*:*:*:*:*:*:*", - "matchCriteriaId": "562772F1-1627-438E-A6B8-7D1AA5536086" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:9.1:*:*:*:*:*:*:*", - "matchCriteriaId": "27D5AF92-A8E1-41BD-B20A-EB26BB6AD4DE" + "criteria": "cpe:2.3:o:suse:linux_enterprise:10.0:sp3:*:*:*:*:*:*", + "matchCriteriaId": "1193A7E6-DCB4-4E79-A509-1D6948153A57" } ] } @@ -376,25 +177,38 @@ "url": "http://blogs.adobe.com/psirt/2009/12/new_adobe_reader_and_acrobat_v.html", "source": "psirt@adobe.com", "tags": [ + "Broken Link", "Vendor Advisory" ] }, { "url": "http://contagiodump.blogspot.com/2009/12/virustotal-httpwww.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "http://lists.opensuse.org/opensuse-security-announce/2010-01/msg00009.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://osvdb.org/60980", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Broken Link" + ] }, { "url": "http://secunia.com/advisories/37690", "source": "psirt@adobe.com", "tags": [ + "Broken Link", "Vendor Advisory" ] }, @@ -402,6 +216,7 @@ "url": "http://secunia.com/advisories/38138", "source": "psirt@adobe.com", "tags": [ + "Broken Link", "Vendor Advisory" ] }, @@ -409,6 +224,7 @@ "url": "http://secunia.com/advisories/38215", "source": "psirt@adobe.com", "tags": [ + "Broken Link", "Vendor Advisory" ] }, @@ -421,39 +237,61 @@ }, { "url": "http://www.adobe.com/support/security/bulletins/apsb10-02.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Not Applicable" + ] }, { "url": "http://www.kb.cert.org/vuls/id/508357", "source": "psirt@adobe.com", "tags": [ + "Third Party Advisory", "US Government Resource" ] }, { "url": "http://www.metasploit.com/redmine/projects/framework/repository/revisions/7881/entry/modules/exploits/windows/fileformat/adobe_media_newplayer.rb", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.redhat.com/support/errata/RHSA-2010-0060.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.securityfocus.com/bid/37331", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.shadowserver.org/wiki/pmwiki.php/Calendar/20091214", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.symantec.com/connect/blogs/zero-day-xmas-present", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.us-cert.gov/cas/techalerts/TA10-013A.html", "source": "psirt@adobe.com", "tags": [ + "Third Party Advisory", "US Government Resource" ] }, @@ -461,24 +299,38 @@ "url": "http://www.vupen.com/english/advisories/2009/3518", "source": "psirt@adobe.com", "tags": [ + "Broken Link", "Vendor Advisory" ] }, { "url": "http://www.vupen.com/english/advisories/2010/0103", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=547799", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54747", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6795", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Broken Link" + ] } ] } \ No newline at end of file diff --git a/CVE-2010/CVE-2010-12xx/CVE-2010-1297.json b/CVE-2010/CVE-2010-12xx/CVE-2010-1297.json index 175169fdee2..a1c22db3883 100644 --- a/CVE-2010/CVE-2010-12xx/CVE-2010-1297.json +++ b/CVE-2010/CVE-2010-12xx/CVE-2010-1297.json @@ -2,8 +2,9 @@ "id": "CVE-2010-1297", "sourceIdentifier": "psirt@adobe.com", "published": "2010-06-08T18:30:10.007", - "lastModified": "2017-09-19T01:30:40.563", - "vulnStatus": "Modified", + "lastModified": "2024-06-28T14:20:44.153", + "vulnStatus": "Analyzed", + "cveTags": [], "cisaExploitAdd": "2022-06-08", "cisaActionDue": "2022-06-22", "cisaRequiredAction": "The impacted product is end-of-life and should be disconnected if still in use.", @@ -19,6 +20,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -52,7 +75,7 @@ "description": [ { "lang": "en", - "value": "NVD-CWE-noinfo" + "value": "CWE-787" } ] } @@ -64,173 +87,31 @@ "operator": "OR", "negate": false, "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.0.2.12610", + "matchCriteriaId": "A520EA13-9274-4E10-84B5-1F1FD9E5CE86" + }, { "vulnerable": true, "criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", - "versionEndIncluding": "9.0.262.0", - "matchCriteriaId": "0793A635-2C4E-482D-A57D-2F634DCE8B7A" + "versionEndExcluding": "9.0.277.0", + "matchCriteriaId": "20C3001C-53F0-4C18-9CC8-89BDF8C6087D" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:9.0.16:*:*:*:*:*:*:*", - "matchCriteriaId": "F35F86B6-D49A-40F4-BFFA-5D6BBA2F7D8B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:9.0.18d60:*:*:*:*:*:*:*", - "matchCriteriaId": "600DDA9D-6440-48D1-8539-7127398A8678" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:9.0.20:*:*:*:*:*:*:*", - "matchCriteriaId": "B4D5E27C-F6BF-4F84-9B83-6AEC98B4AA14" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:9.0.20.0:*:*:*:*:*:*:*", - "matchCriteriaId": "934A869D-D58D-4C36-B86E-013F62790585" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:9.0.28:*:*:*:*:*:*:*", - "matchCriteriaId": "ACFA6611-99DA-48B0-89F7-DD99B8E30334" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:9.0.28.0:*:*:*:*:*:*:*", - "matchCriteriaId": "59AF804B-BD7A-4AD7-AD44-B5D980443B8B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:9.0.31:*:*:*:*:*:*:*", - "matchCriteriaId": "F5D52F86-2E38-4C66-9939-7603367B8D0E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:9.0.31.0:*:*:*:*:*:*:*", - "matchCriteriaId": "0557AA2A-FA3A-460A-8F03-DC74B149CA3D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:9.0.45.0:*:*:*:*:*:*:*", - "matchCriteriaId": "2FC04ABF-6191-4AA5-90B2-E7A97E6C6005" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:9.0.47.0:*:*:*:*:*:*:*", - "matchCriteriaId": "F22F1B02-CCF5-4770-A79B-1F58CA4321CE" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:9.0.48.0:*:*:*:*:*:*:*", - "matchCriteriaId": "93957171-F1F4-43ED-A8B9-2D36C81EB1F9" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:9.0.112.0:*:*:*:*:*:*:*", - "matchCriteriaId": "7AE89894-E492-4380-8A2B-4CDD3A15667A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:9.0.114.0:*:*:*:*:*:*:*", - "matchCriteriaId": "1C6ED706-BAF2-4795-B597-6F7EE8CA8911" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:9.0.115.0:*:*:*:*:*:*:*", - "matchCriteriaId": "260E2CF6-4D15-4168-A933-3EC52D8F93FF" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:9.0.124.0:*:*:*:*:*:*:*", - "matchCriteriaId": "D50BF190-2629-49A8-A377-4723C93FFB3E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:9.0.125.0:*:*:*:*:*:*:*", - "matchCriteriaId": "9E59E2AD-38BB-46DF-AC0D-D36F1F259AD4" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:9.0.151.0:*:*:*:*:*:*:*", - "matchCriteriaId": "DD04F04C-30CE-4A8D-B254-B10DEF62CEEE" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:9.0.152.0:*:*:*:*:*:*:*", - "matchCriteriaId": "96DC7742-499D-4BF5-9C5B-FCFF912A9892" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:9.0.159.0:*:*:*:*:*:*:*", - "matchCriteriaId": "33AC4365-576C-487A-89C5-197A26D416C4" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:9.0.246.0:*:*:*:*:*:*:*", - "matchCriteriaId": "84B367AC-E1E1-4BC5-8BF4-D5B517C0CA7C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:9.0.260.0:*:*:*:*:*:*:*", - "matchCriteriaId": "A0A9C054-1F82-41DD-BE13-2B71B6F87F22" - } - ] - } - ] - }, - { - "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", - "versionEndIncluding": "10.0.45.2", - "matchCriteriaId": "44CD02DC-30FC-4429-84B7-7BE1D2007DAE" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:10.0.0.584:*:*:*:*:*:*:*", - "matchCriteriaId": "08E4028B-72E7-4E4A-AD0F-645F5AACAA29" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:10.0.12.10:*:*:*:*:*:*:*", - "matchCriteriaId": "63313ADA-3C52-47C8-9745-6BF6AEF0F6AD" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:10.0.12.36:*:*:*:*:*:*:*", - "matchCriteriaId": "BA646396-7C10-45A0-89A9-C75C5D8AFB3E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:10.0.15.3:*:*:*:*:*:*:*", - "matchCriteriaId": "476BB487-150A-4482-8C84-E6A2995A97E1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:10.0.22.87:*:*:*:*:*:*:*", - "matchCriteriaId": "3555324F-40F8-4BF4-BE5F-52A1E22B3AFA" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:10.0.32.18:*:*:*:*:*:*:*", - "matchCriteriaId": "60540FDE-8C31-4679-A85E-614B1EFE1FF0" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:10.0.42.34:*:*:*:*:*:*:*", - "matchCriteriaId": "AE652520-B693-47F1-A342-621C149A7430" + "criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0", + "versionEndExcluding": "10.1.53.64", + "matchCriteriaId": "2AA8832A-7A0F-4823-9038-B9FD37506911" } ] } ] }, { + "operator": "AND", "nodes": [ { "operator": "OR", @@ -239,48 +120,32 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*", - "versionEndIncluding": "9.3.2", - "matchCriteriaId": "863D682E-57C3-4FE2-A521-92DCB5DA5F64" + "versionStartIncluding": "8.0", + "versionEndExcluding": "8.2.3", + "matchCriteriaId": "3BEBBDB0-9D07-434D-A30D-D21AE17D6CA1" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:9.0:*:*:*:*:*:*:*", - "matchCriteriaId": "5AA53564-9ACD-4CFB-9AAC-A77440026A57" + "criteria": "cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*", + "versionStartIncluding": "9.0", + "versionEndExcluding": "9.3.3", + "matchCriteriaId": "5291AD2C-5AC9-4F31-8FC7-D0F117A91099" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4781BF1E-8A4E-4AFF-9540-23D523EE30DD" }, { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:9.1:*:*:*:*:*:*:*", - "matchCriteriaId": "C7EC46E3-77B7-4455-B3E0-A45C6B69B3DC" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:9.1.1:*:*:*:*:*:*:*", - "matchCriteriaId": "4F475858-DCE2-4C93-A51A-04718DF17593" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:9.1.2:*:*:*:*:*:*:*", - "matchCriteriaId": "88687272-4CD0-42A2-B727-C322ABDE3549" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:9.1.3:*:*:*:*:*:*:*", - "matchCriteriaId": "1E5C4FA4-3786-47AF-BD7D-8E75927EB3AA" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:9.2:*:*:*:*:*:*:*", - "matchCriteriaId": "B35CC915-EEE3-4E86-9E09-1893C725E07B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:9.3:*:*:*:*:*:*:*", - "matchCriteriaId": "76201694-E5C5-4CA3-8919-46937AFDAAE3" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:9.3.1:*:*:*:*:*:*:*", - "matchCriteriaId": "397AB988-1C2C-4247-9B34-806094197CB5" + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" } ] } @@ -294,49 +159,25 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:*", - "versionEndIncluding": "9.3.2", - "matchCriteriaId": "0D47D2EC-CDEA-4FA1-B31F-0362A04E77CC" + "criteria": "cpe:2.3:o:opensuse:opensuse:*:*:*:*:*:*:*:*", + "versionStartIncluding": "11.0", + "versionEndIncluding": "11.2", + "matchCriteriaId": "9B9D5815-B269-4E63-8F37-E064B49EBF71" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:9.0:*:*:*:*:*:*:*", - "matchCriteriaId": "562772F1-1627-438E-A6B8-7D1AA5536086" + "criteria": "cpe:2.3:o:suse:linux_enterprise:10.0:sp3:*:*:*:*:*:*", + "matchCriteriaId": "1193A7E6-DCB4-4E79-A509-1D6948153A57" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:9.1:*:*:*:*:*:*:*", - "matchCriteriaId": "27D5AF92-A8E1-41BD-B20A-EB26BB6AD4DE" + "criteria": "cpe:2.3:o:suse:linux_enterprise:11.0:-:*:*:*:*:*:*", + "matchCriteriaId": "1608E282-2E96-4447-848D-DBE915DB0EF9" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:9.1.1:*:*:*:*:*:*:*", - "matchCriteriaId": "F25C9167-C6D4-4264-9197-50878EDA2D96" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:9.1.2:*:*:*:*:*:*:*", - "matchCriteriaId": "DD1D7308-09E9-42B2-8836-DC2326C62A9E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:9.1.3:*:*:*:*:*:*:*", - "matchCriteriaId": "B5C251D2-4C9B-4029-8BED-0FCAED3B8E89" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:9.2:*:*:*:*:*:*:*", - "matchCriteriaId": "2432AC17-5378-4C61-A775-5172FD44EC03" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:9.3:*:*:*:*:*:*:*", - "matchCriteriaId": "B6BA82F4-470D-4A46-89B2-D2F3C8FA31C8" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:9.3.1:*:*:*:*:*:*:*", - "matchCriteriaId": "39EDED39-664F-4B68-B422-2CCCA3B83550" + "criteria": "cpe:2.3:o:suse:linux_enterprise:11.0:sp1:*:*:*:*:*:*", + "matchCriteriaId": "4500161F-13A0-4369-B93A-778B34E7F005" } ] } @@ -346,32 +187,54 @@ "references": [ { "url": "http://blog.zynamics.com/2010/06/09/analyzing-the-currently-exploited-0-day-for-adobe-reader-and-adobe-flash/", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Exploit" + ] }, { "url": "http://community.websense.com/blogs/securitylabs/archive/2010/06/09/having-fun-with-adobe-0-day-exploits.aspx", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Broken Link" + ] }, { "url": "http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Broken Link" + ] }, { "url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00000.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://secunia.com/advisories/40026", "source": "psirt@adobe.com", "tags": [ + "Broken Link", "Vendor Advisory" ] }, @@ -379,44 +242,80 @@ "url": "http://secunia.com/advisories/40034", "source": "psirt@adobe.com", "tags": [ + "Broken Link", "Vendor Advisory" ] }, { "url": "http://secunia.com/advisories/40144", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Broken Link" + ] }, { "url": "http://secunia.com/advisories/40545", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Broken Link" + ] }, { "url": "http://secunia.com/advisories/43026", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Broken Link" + ] }, { "url": "http://security.gentoo.org/glsa/glsa-201101-09.xml", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://securitytracker.com/id?1024057", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://securitytracker.com/id?1024058", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://securitytracker.com/id?1024085", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://securitytracker.com/id?1024086", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://support.apple.com/kb/HT4435", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.adobe.com/support/security/advisories/apsa10-01.html", @@ -427,51 +326,85 @@ }, { "url": "http://www.adobe.com/support/security/bulletins/apsb10-14.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Not Applicable" + ] }, { "url": "http://www.adobe.com/support/security/bulletins/apsb10-15.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Not Applicable" + ] }, { "url": "http://www.exploit-db.com/exploits/13787", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.kb.cert.org/vuls/id/486225", "source": "psirt@adobe.com", "tags": [ + "Third Party Advisory", "US Government Resource" ] }, { "url": "http://www.osvdb.org/65141", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.redhat.com/support/errata/RHSA-2010-0464.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.redhat.com/support/errata/RHSA-2010-0470.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.securityfocus.com/bid/40586", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.securityfocus.com/bid/40759", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.turbolinux.co.jp/security/2010/TLSA-2010-19j.txt", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.us-cert.gov/cas/techalerts/TA10-159A.html", "source": "psirt@adobe.com", "tags": [ + "Third Party Advisory", "US Government Resource" ] }, @@ -479,6 +412,7 @@ "url": "http://www.us-cert.gov/cas/techalerts/TA10-162A.html", "source": "psirt@adobe.com", "tags": [ + "Third Party Advisory", "US Government Resource" ] }, @@ -486,6 +420,7 @@ "url": "http://www.vupen.com/english/advisories/2010/1348", "source": "psirt@adobe.com", "tags": [ + "Broken Link", "Vendor Advisory" ] }, @@ -493,52 +428,87 @@ "url": "http://www.vupen.com/english/advisories/2010/1349", "source": "psirt@adobe.com", "tags": [ + "Broken Link", "Vendor Advisory" ] }, { "url": "http://www.vupen.com/english/advisories/2010/1421", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.vupen.com/english/advisories/2010/1432", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.vupen.com/english/advisories/2010/1434", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.vupen.com/english/advisories/2010/1453", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.vupen.com/english/advisories/2010/1482", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.vupen.com/english/advisories/2010/1522", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.vupen.com/english/advisories/2010/1636", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.vupen.com/english/advisories/2010/1793", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.vupen.com/english/advisories/2011/0192", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/59137", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7116", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Broken Link" + ] } ] } \ No newline at end of file diff --git a/CVE-2010/CVE-2010-25xx/CVE-2010-2568.json b/CVE-2010/CVE-2010-25xx/CVE-2010-2568.json index f9d3a7f61c7..fb34d0ed729 100644 --- a/CVE-2010/CVE-2010-25xx/CVE-2010-2568.json +++ b/CVE-2010/CVE-2010-25xx/CVE-2010-2568.json @@ -2,8 +2,9 @@ "id": "CVE-2010-2568", "sourceIdentifier": "secure@microsoft.com", "published": "2010-07-22T05:43:49.703", - "lastModified": "2023-12-07T18:38:56.693", - "vulnStatus": "Modified", + "lastModified": "2024-06-28T14:02:11.327", + "vulnStatus": "Analyzed", + "cveTags": [], "evaluatorSolution": "Per: http://www.microsoft.com/technet/security/advisory/2286198.mspx\r\n\r\nMicrosoft has completed the investigation into a public report of this vulnerability. We have issued MS10-046 to address this issue.\r\n\r\nhttp://www.microsoft.com/technet/security/bulletin/MS10-046.mspx", "cisaExploitAdd": "2022-09-15", "cisaActionDue": "2022-10-06", @@ -20,6 +21,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -53,7 +76,7 @@ "description": [ { "lang": "en", - "value": "CWE-20" + "value": "NVD-CWE-noinfo" } ] } @@ -65,16 +88,6 @@ "operator": "OR", "negate": false, "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_2003_server:*:sp2:*:*:*:*:*:*", - "matchCriteriaId": "2978BF86-5A1A-438E-B81F-F360D0E30C9C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_2003_server:*:sp2:itanium:*:*:*:*:*", - "matchCriteriaId": "F7EFB032-47F4-4497-B16B-CB9126EAC9DF" - }, { "vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:*", @@ -82,73 +95,28 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_server_2003:*:sp2:*:*:*:*:*:*", - "matchCriteriaId": "4D3B5E4F-56A6-4696-BBB4-19DF3613D020" + "criteria": "cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:*:*", + "matchCriteriaId": "1D929AA2-EE0B-4AA1-805D-69BCCA11B77F" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_server_2008:*:*:itanium:*:*:*:*:*", - "matchCriteriaId": "7F6EA111-A4E6-4963-A0C8-F9336C605B6E" + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:-:*:*:*:*:*:*", + "matchCriteriaId": "C2EE0AD3-2ADC-480E-B03E-06962EC4F095" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_server_2008:*:*:x32:*:*:*:*:*", - "matchCriteriaId": "9CFB1A97-8042-4497-A45D-C014B5E240AB" + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", + "matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_server_2008:*:*:x64:*:*:*:*:*", - "matchCriteriaId": "7F9C7616-658D-409D-8B53-AC00DC55602A" + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:*:*:*:*:*:itanium:*", + "matchCriteriaId": "B20DD263-5A62-4CB1-BD47-D1F9A6C67E08" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x32:*:*:*:*:*", - "matchCriteriaId": "B8A32637-65EC-42C4-A892-0E599562527C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x64:*:*:*:*:*", - "matchCriteriaId": "FFF81F4B-7D92-4398-8658-84530FB8F518" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:*:itanium:*:*:*:*:*", - "matchCriteriaId": "DBE4A4EA-A0DE-4FDE-B9EC-D8729E17A1F1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:*:x64:*:*:*:*:*", - "matchCriteriaId": "E8000F58-DF1C-464C-A14B-783CDC00E781" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:gold:itanium:*:*:*:*:*", - "matchCriteriaId": "5AEA67EA-C788-4CF2-9246-01475302238E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:itanium:*:*:*:*:*", - "matchCriteriaId": "7AE15F6C-80F6-43A6-86DA-B92116A697A0" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:*:itanium:*:*:*:*:*", - "matchCriteriaId": "CC916D5A-0644-4423-A52E-D4310906BE78" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:*:x64:*:*:*:*:*", - "matchCriteriaId": "95DC297F-06DB-4FB3-BFB6-7312C059E047" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_vista:*:sp1:*:*:*:*:*:*", - "matchCriteriaId": "C162FFF0-1E8F-4DCF-A08F-6C6E324ED878" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*", - "matchCriteriaId": "0A0D2704-C058-420B-B368-372D1129E914" + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:*:*:*:*:*:x64:*", + "matchCriteriaId": "B7674920-AE12-4A25-BE57-34AEDDA74D76" }, { "vulnerable": true, @@ -162,13 +130,13 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*", - "matchCriteriaId": "CE477A73-4EE4-41E9-8694-5A3D5DC88656" + "criteria": "cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:professional:*:x64:*", + "matchCriteriaId": "C6109348-BC79-4ED3-8D41-EA546A540C79" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_xp:-:sp2:x64:*:*:*:*:*", - "matchCriteriaId": "FFAC3F90-77BF-4F56-A89B-8A3D2D1FC6D6" + "criteria": "cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:*:*:*:*", + "matchCriteriaId": "C9392D35-7BF5-48E9-879B-BBDE9A9E9AB9" } ] } @@ -178,30 +146,48 @@ "references": [ { "url": "http://isc.sans.edu/diary.html?storyid=9181", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Broken Link" + ] }, { "url": "http://isc.sans.edu/diary.html?storyid=9190", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Broken Link" + ] }, { "url": "http://krebsonsecurity.com/2010/07/experts-warn-of-new-windows-shortcut-flaw/", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Press/Media Coverage" + ] }, { "url": "http://secunia.com/advisories/40647", "source": "secure@microsoft.com", "tags": [ + "Broken Link", "Vendor Advisory" ] }, { "url": "http://securitytracker.com/id?1024216", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.f-secure.com/weblog/archives/00001986.html", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Not Applicable" + ] }, { "url": "http://www.f-secure.com/weblog/archives/new_rootkit_en.pdf", @@ -215,6 +201,7 @@ "source": "secure@microsoft.com", "tags": [ "Patch", + "Third Party Advisory", "US Government Resource" ] }, @@ -230,27 +217,41 @@ "url": "http://www.securityfocus.com/bid/41732", "source": "secure@microsoft.com", "tags": [ - "Exploit" + "Broken Link", + "Exploit", + "Third Party Advisory", + "VDB Entry" ] }, { "url": "http://www.us-cert.gov/cas/techalerts/TA10-222A.html", "source": "secure@microsoft.com", "tags": [ + "Third Party Advisory", "US Government Resource" ] }, { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-046", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] }, { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11564", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://www.geoffchappell.com/notes/security/stuxnet/ctrlfldr.htm", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2010/CVE-2010-25xx/CVE-2010-2572.json b/CVE-2010/CVE-2010-25xx/CVE-2010-2572.json index bbe2dac4f07..57cc587afa4 100644 --- a/CVE-2010/CVE-2010-25xx/CVE-2010-2572.json +++ b/CVE-2010/CVE-2010-25xx/CVE-2010-2572.json @@ -2,8 +2,9 @@ "id": "CVE-2010-2572", "sourceIdentifier": "secure@microsoft.com", "published": "2010-11-10T03:00:01.850", - "lastModified": "2018-10-12T21:58:00.563", - "vulnStatus": "Modified", + "lastModified": "2024-06-28T14:16:06.983", + "vulnStatus": "Analyzed", + "cveTags": [], "cisaExploitAdd": "2022-06-08", "cisaActionDue": "2022-06-22", "cisaRequiredAction": "Apply updates per vendor instructions.", @@ -19,6 +20,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -52,7 +75,7 @@ "description": [ { "lang": "en", - "value": "CWE-119" + "value": "CWE-120" } ] } @@ -84,16 +107,24 @@ "url": "http://www.us-cert.gov/cas/techalerts/TA10-313A.html", "source": "secure@microsoft.com", "tags": [ + "Third Party Advisory", "US Government Resource" ] }, { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-088", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] }, { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12195", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Broken Link" + ] } ] } \ No newline at end of file diff --git a/CVE-2010/CVE-2010-28xx/CVE-2010-2883.json b/CVE-2010/CVE-2010-28xx/CVE-2010-2883.json index fcfeb84f8cb..56e277fb40e 100644 --- a/CVE-2010/CVE-2010-28xx/CVE-2010-2883.json +++ b/CVE-2010/CVE-2010-28xx/CVE-2010-2883.json @@ -2,8 +2,9 @@ "id": "CVE-2010-2883", "sourceIdentifier": "psirt@adobe.com", "published": "2010-09-09T22:00:02.250", - "lastModified": "2018-10-30T16:25:16.967", - "vulnStatus": "Modified", + "lastModified": "2024-06-28T14:16:27.380", + "vulnStatus": "Analyzed", + "cveTags": [], "evaluatorSolution": "Per: http://www.adobe.com/support/security/advisories/apsa10-02.html\r\n\r\n'Adobe is in the process of evaluating the schedule for an update to resolve this vulnerability.'", "evaluatorImpact": "Per: http://www.adobe.com/support/security/advisories/apsa10-02.html\r\n\r\n\r\n'Affected software versions\r\n\r\nAdobe Reader 9.3.4 and earlier versions for Windows, Macintosh and UNIX, and Adobe Acrobat 9.3.4 and earlier versions for Windows and Macintosh.'", "cisaExploitAdd": "2022-06-08", @@ -21,6 +22,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.3, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.3, + "impactScore": 5.9 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -54,7 +77,7 @@ "description": [ { "lang": "en", - "value": "CWE-119" + "value": "CWE-787" } ] } @@ -70,123 +93,16 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*", - "versionEndIncluding": "9.3.4", - "matchCriteriaId": "89F57593-6085-4B97-9755-80AB71B244E1" + "versionStartIncluding": "8.0", + "versionEndExcluding": "8.2.5", + "matchCriteriaId": "38C52D23-D5BD-4325-ABA9-FA14F07AF54F" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:8.0:*:*:*:*:*:*:*", - "matchCriteriaId": "26AE76F7-D7F6-4AF2-A5C6-708B5642C288" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:8.1:*:*:*:*:*:*:*", - "matchCriteriaId": "749FFB51-65D4-4A4B-95F3-742440276897" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:8.1.1:*:*:*:*:*:*:*", - "matchCriteriaId": "C8665E53-EC1E-4B95-9064-2565BC12113E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:8.1.2:*:*:*:*:*:*:*", - "matchCriteriaId": "24218FDA-F9DA-465A-B5D5-76A55C7EE04E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:8.1.3:*:*:*:*:*:*:*", - "matchCriteriaId": "E2C5F1C5-85CD-47B9-897F-E51D6902AF72" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:8.1.4:*:*:*:*:*:*:*", - "matchCriteriaId": "E0E190FF-3EBC-44AB-8072-4D964E843E8A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:8.1.5:*:*:*:*:*:*:*", - "matchCriteriaId": "6A624D44-C135-4ED3-9BA4-F4F8A044850B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:8.1.6:*:*:*:*:*:*:*", - "matchCriteriaId": "B95C0A99-42E4-40A9-BF61-507E4E4DC052" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:8.1.7:*:*:*:*:*:*:*", - "matchCriteriaId": "3B9F55CC-3681-4A67-99D1-3F40447392D5" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:8.2:*:*:*:*:*:*:*", - "matchCriteriaId": "A9C0AC89-804B-44A1-929A-118993B6BAA7" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:8.2.1:*:*:*:*:*:*:*", - "matchCriteriaId": "39B174C3-1BA6-4654-BFA4-CC126454E147" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:8.2.2:*:*:*:*:*:*:*", - "matchCriteriaId": "6ACDAA2B-3977-4590-9F16-5DDB6FF6545B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:8.2.4:*:*:*:*:*:*:*", - "matchCriteriaId": "7832B75B-7868-44DE-A9A4-CBD9CC117DB4" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:9.0:*:*:*:*:*:*:*", - "matchCriteriaId": "5AA53564-9ACD-4CFB-9AAC-A77440026A57" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:9.1:*:*:*:*:*:*:*", - "matchCriteriaId": "C7EC46E3-77B7-4455-B3E0-A45C6B69B3DC" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:9.1.1:*:*:*:*:*:*:*", - "matchCriteriaId": "4F475858-DCE2-4C93-A51A-04718DF17593" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:9.1.2:*:*:*:*:*:*:*", - "matchCriteriaId": "88687272-4CD0-42A2-B727-C322ABDE3549" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:9.1.3:*:*:*:*:*:*:*", - "matchCriteriaId": "1E5C4FA4-3786-47AF-BD7D-8E75927EB3AA" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:9.2:*:*:*:*:*:*:*", - "matchCriteriaId": "B35CC915-EEE3-4E86-9E09-1893C725E07B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:9.3:*:*:*:*:*:*:*", - "matchCriteriaId": "76201694-E5C5-4CA3-8919-46937AFDAAE3" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:9.3.1:*:*:*:*:*:*:*", - "matchCriteriaId": "397AB988-1C2C-4247-9B34-806094197CB5" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:9.3.2:*:*:*:*:*:*:*", - "matchCriteriaId": "8FA0B8C3-8060-4685-A241-9852BD63B7A0" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:9.3.3:*:*:*:*:*:*:*", - "matchCriteriaId": "4AB9BBDE-634A-47CF-BA49-67382B547900" + "criteria": "cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*", + "versionStartIncluding": "9.0", + "versionEndExcluding": "9.4", + "matchCriteriaId": "EAC4A665-19CA-495D-A00F-6B42EA627E0F" } ] }, @@ -196,13 +112,13 @@ "cpeMatch": [ { "vulnerable": false, - "criteria": "cpe:2.3:a:apple:mac_os_x:*:*:*:*:*:*:*:*", - "matchCriteriaId": "CF0D73F4-3063-4B66-882E-39E50708E279" + "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", + "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E" }, { "vulnerable": false, - "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", - "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256" + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" } ] } @@ -218,118 +134,16 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:*", - "versionEndIncluding": "9.3.4", - "matchCriteriaId": "7A5D3F63-85B9-474E-913E-F1341652C702" + "versionStartIncluding": "8.0", + "versionEndExcluding": "8.2.5", + "matchCriteriaId": "B742E5CB-5047-4E30-BE12-B5C3EB428503" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:8.0:*:*:*:*:*:*:*", - "matchCriteriaId": "996EB48E-D2A8-49E4-915A-EBDE26A9FB94" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:8.1:*:*:*:*:*:*:*", - "matchCriteriaId": "97E20936-EE31-4CEB-A710-3165A28BAD69" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:8.1.1:*:*:*:*:*:*:*", - "matchCriteriaId": "5BD9952C-A1D0-4DFB-A292-9B86D7EAE5FD" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:8.1.2:*:*:*:*:*:*:*", - "matchCriteriaId": "C5BEA847-A71E-4336-AB67-B3C38847C1C3" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:8.1.4:*:*:*:*:*:*:*", - "matchCriteriaId": "39F6994B-6969-485B-9286-2592B11A47BF" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:8.1.5:*:*:*:*:*:*:*", - "matchCriteriaId": "FC533775-B52E-43F0-BF19-1473BE36232D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:8.1.6:*:*:*:*:*:*:*", - "matchCriteriaId": "18D1C85E-42CC-46F2-A7B6-DAC3C3995330" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:8.1.7:*:*:*:*:*:*:*", - "matchCriteriaId": "C4670451-511E-496C-A78A-887366E1E992" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:8.2.1:*:*:*:*:*:*:*", - "matchCriteriaId": "35994F76-CD13-4301-9134-FC0CBEA37D97" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:8.2.2:*:*:*:*:*:*:*", - "matchCriteriaId": "0FB61191-F955-4DE6-A86B-36E031DE1F99" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:8.2.3:*:*:*:*:*:*:*", - "matchCriteriaId": "E32D68D5-6A79-454B-B14F-9BC865413E3B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:8.2.4:*:*:*:*:*:*:*", - "matchCriteriaId": "2A57581C-A139-41C3-B9DB-0C4CFA7A1BB2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:9.0:*:*:*:*:*:*:*", - "matchCriteriaId": "562772F1-1627-438E-A6B8-7D1AA5536086" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:9.1:*:*:*:*:*:*:*", - "matchCriteriaId": "27D5AF92-A8E1-41BD-B20A-EB26BB6AD4DE" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:9.1.1:*:*:*:*:*:*:*", - "matchCriteriaId": "F25C9167-C6D4-4264-9197-50878EDA2D96" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:9.1.2:*:*:*:*:*:*:*", - "matchCriteriaId": "DD1D7308-09E9-42B2-8836-DC2326C62A9E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:9.1.3:*:*:*:*:*:*:*", - "matchCriteriaId": "B5C251D2-4C9B-4029-8BED-0FCAED3B8E89" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:9.2:*:*:*:*:*:*:*", - "matchCriteriaId": "2432AC17-5378-4C61-A775-5172FD44EC03" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:9.3:*:*:*:*:*:*:*", - "matchCriteriaId": "B6BA82F4-470D-4A46-89B2-D2F3C8FA31C8" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:9.3.1:*:*:*:*:*:*:*", - "matchCriteriaId": "39EDED39-664F-4B68-B422-2CCCA3B83550" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:9.3.2:*:*:*:*:*:*:*", - "matchCriteriaId": "B508C5CE-1386-47B3-B301-B78DBB3A75D9" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:9.3.3:*:*:*:*:*:*:*", - "matchCriteriaId": "DDC2EEB6-D5EC-430F-962A-1279C9970441" + "criteria": "cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:*", + "versionStartIncluding": "9.0", + "versionEndExcluding": "9.4", + "matchCriteriaId": "49CF11ED-51D6-4376-8AB3-B062EFAE945F" } ] }, @@ -339,13 +153,13 @@ "cpeMatch": [ { "vulnerable": false, - "criteria": "cpe:2.3:a:apple:mac_os_x:*:*:*:*:*:*:*:*", - "matchCriteriaId": "CF0D73F4-3063-4B66-882E-39E50708E279" + "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", + "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E" }, { "vulnerable": false, - "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", - "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256" + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" } ] } @@ -355,24 +169,37 @@ "references": [ { "url": "http://blog.metasploit.com/2010/09/return-of-unpublished-adobe.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Broken Link" + ] }, { "url": "http://community.websense.com/blogs/securitylabs/archive/2010/09/10/brief-analysis-on-adobe-reader-sing-table-parsing-vulnerability-cve-2010-2883.aspx", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Broken Link" + ] }, { "url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00001.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Broken Link" + ] }, { "url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Broken Link" + ] }, { "url": "http://secunia.com/advisories/41340", "source": "psirt@adobe.com", "tags": [ + "Broken Link", "Vendor Advisory" ] }, @@ -380,12 +207,16 @@ "url": "http://secunia.com/advisories/43025", "source": "psirt@adobe.com", "tags": [ + "Broken Link", "Vendor Advisory" ] }, { "url": "http://security.gentoo.org/glsa/glsa-201101-08.xml", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://www.adobe.com/support/security/advisories/apsa10-02.html", @@ -396,31 +227,47 @@ }, { "url": "http://www.adobe.com/support/security/bulletins/apsb10-21.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "http://www.kb.cert.org/vuls/id/491991", "source": "psirt@adobe.com", "tags": [ + "Third Party Advisory", "US Government Resource" ] }, { "url": "http://www.redhat.com/support/errata/RHSA-2010-0743.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.securityfocus.com/bid/43057", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.turbolinux.co.jp/security/2011/TLSA-2011-2j.txt", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.us-cert.gov/cas/techalerts/TA10-279A.html", "source": "psirt@adobe.com", "tags": [ + "Third Party Advisory", "US Government Resource" ] }, @@ -428,6 +275,7 @@ "url": "http://www.vupen.com/english/advisories/2010/2331", "source": "psirt@adobe.com", "tags": [ + "Broken Link", "Vendor Advisory" ] }, @@ -435,6 +283,7 @@ "url": "http://www.vupen.com/english/advisories/2011/0191", "source": "psirt@adobe.com", "tags": [ + "Broken Link", "Vendor Advisory" ] }, @@ -442,16 +291,24 @@ "url": "http://www.vupen.com/english/advisories/2011/0344", "source": "psirt@adobe.com", "tags": [ + "Broken Link", "Vendor Advisory" ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/61635", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11586", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Broken Link" + ] } ] } \ No newline at end of file diff --git a/CVE-2011/CVE-2011-06xx/CVE-2011-0609.json b/CVE-2011/CVE-2011-06xx/CVE-2011-0609.json index 85b4e10ac49..ae966b24697 100644 --- a/CVE-2011/CVE-2011-06xx/CVE-2011-0609.json +++ b/CVE-2011/CVE-2011-06xx/CVE-2011-0609.json @@ -2,8 +2,9 @@ "id": "CVE-2011-0609", "sourceIdentifier": "psirt@adobe.com", "published": "2011-03-15T17:55:03.827", - "lastModified": "2018-10-30T16:26:24.687", - "vulnStatus": "Modified", + "lastModified": "2024-06-28T14:20:56.560", + "vulnStatus": "Analyzed", + "cveTags": [], "cisaExploitAdd": "2022-06-08", "cisaActionDue": "2022-06-22", "cisaRequiredAction": "The impacted product is end-of-life and should be disconnected if still in use.", @@ -19,6 +20,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -70,391 +93,6 @@ "criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "versionEndIncluding": "10.2.154.13", "matchCriteriaId": "9CE70003-27CE-4189-8F09-E8E25168BDC2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:6.0.21.0:*:*:*:*:*:*:*", - "matchCriteriaId": "7143E94B-F3CD-4E32-A7BB-C72C816EEACA" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:6.0.79:*:*:*:*:*:*:*", - "matchCriteriaId": "4654752C-F677-4066-8C48-BAD09392A594" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:7.0:*:*:*:*:*:*:*", - "matchCriteriaId": "DDFF4A51-C936-4C5B-8276-FD454C9E4F40" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:7.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "D5ECC9D7-3386-4FEA-9218-91E31FF90F3A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:7.0.14.0:*:*:*:*:*:*:*", - "matchCriteriaId": "6E81EA32-9621-4ACE-9191-2E9B8C24D500" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:7.0.19.0:*:*:*:*:*:*:*", - "matchCriteriaId": "3B0E10D6-6348-471B-918A-60AAE2AC5F86" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:7.0.24.0:*:*:*:*:*:*:*", - "matchCriteriaId": "F7FBE855-7EE3-46F2-9FA1-0366AC8C5D24" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:7.0.25:*:*:*:*:*:*:*", - "matchCriteriaId": "F0E93289-6EE0-401A-958D-F59D2CDAE2F1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:7.0.53.0:*:*:*:*:*:*:*", - "matchCriteriaId": "A67FC00F-0C85-4DD7-81EA-65533EABC767" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:7.0.60.0:*:*:*:*:*:*:*", - "matchCriteriaId": "14E67AD7-0791-4D5D-A3B2-E173088B5228" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:7.0.61.0:*:*:*:*:*:*:*", - "matchCriteriaId": "EAF07696-9C85-470E-B608-1B0193CAFB6D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:7.0.63:*:*:*:*:*:*:*", - "matchCriteriaId": "0FA3E556-BF8F-4D30-8DE5-09DA3FD8D5C3" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:7.0.66.0:*:*:*:*:*:*:*", - "matchCriteriaId": "C0DC1B9D-686D-46A3-B9F4-DD4E078DF74D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:7.0.67.0:*:*:*:*:*:*:*", - "matchCriteriaId": "4BC3ABBA-8B36-448D-883B-C675C202028A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:7.0.68.0:*:*:*:*:*:*:*", - "matchCriteriaId": "EF2A52D9-0A1C-4E53-AFA2-148FF03D23A3" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:7.0.69.0:*:*:*:*:*:*:*", - "matchCriteriaId": "A82D5B56-44E0-4120-B73E-0A1155AF4B05" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:7.0.70.0:*:*:*:*:*:*:*", - "matchCriteriaId": "8E895107-ED8A-4F88-87C3-935EAE299C01" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:7.0.73.0:*:*:*:*:*:*:*", - "matchCriteriaId": "1752F67C-75A9-4226-AB30-A94EB6C85526" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:7.1:*:*:*:*:*:*:*", - "matchCriteriaId": "4007D621-A0BC-4927-82A7-10D73802BCF8" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:7.1.1:*:*:*:*:*:*:*", - "matchCriteriaId": "641776AE-5408-439E-8290-DD9324771874" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:7.2:*:*:*:*:*:*:*", - "matchCriteriaId": "138A932A-D775-46A2-86EC-3C03C96884C4" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:8.0:*:*:*:*:*:*:*", - "matchCriteriaId": "D12E3957-D7B2-4F3B-BB64-8B50B8958DEF" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:8.0.22.0:*:*:*:*:*:*:*", - "matchCriteriaId": "C0C5537E-3153-400D-9F9B-91E7F1218C8A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:8.0.24.0:*:*:*:*:*:*:*", - "matchCriteriaId": "32912721-F750-4C20-B999-E728F7D3A85D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:8.0.33.0:*:*:*:*:*:*:*", - "matchCriteriaId": "6693B1C4-B2A9-4725-AD0E-A266B9DF55AB" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:8.0.34.0:*:*:*:*:*:*:*", - "matchCriteriaId": "A95FA639-346C-491C-81A8-6C2A7B01AA19" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:8.0.35.0:*:*:*:*:*:*:*", - "matchCriteriaId": "C9F1E5AB-DEFA-42FC-A299-C8EEB778F9C6" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:8.0.39.0:*:*:*:*:*:*:*", - "matchCriteriaId": "FC7DD938-F963-4E03-B66B-F00436E4EA9D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:8.0.42.0:*:*:*:*:*:*:*", - "matchCriteriaId": "351825F4-227D-4743-A74B-EAFC1034500B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:9.0:*:*:*:*:*:*:*", - "matchCriteriaId": "B2A0777F-22C2-4FD5-BE81-8982BE6874D2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:9.0.16:*:*:*:*:*:*:*", - "matchCriteriaId": "F35F86B6-D49A-40F4-BFFA-5D6BBA2F7D8B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:9.0.18d60:*:*:*:*:*:*:*", - "matchCriteriaId": "600DDA9D-6440-48D1-8539-7127398A8678" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:9.0.20:*:*:*:*:*:*:*", - "matchCriteriaId": "B4D5E27C-F6BF-4F84-9B83-6AEC98B4AA14" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:9.0.20.0:*:*:*:*:*:*:*", - "matchCriteriaId": "934A869D-D58D-4C36-B86E-013F62790585" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:9.0.28:*:*:*:*:*:*:*", - "matchCriteriaId": "ACFA6611-99DA-48B0-89F7-DD99B8E30334" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:9.0.28.0:*:*:*:*:*:*:*", - "matchCriteriaId": "59AF804B-BD7A-4AD7-AD44-B5D980443B8B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:9.0.31:*:*:*:*:*:*:*", - "matchCriteriaId": "F5D52F86-2E38-4C66-9939-7603367B8D0E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:9.0.31.0:*:*:*:*:*:*:*", - "matchCriteriaId": "0557AA2A-FA3A-460A-8F03-DC74B149CA3D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:9.0.45.0:*:*:*:*:*:*:*", - "matchCriteriaId": "2FC04ABF-6191-4AA5-90B2-E7A97E6C6005" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:9.0.47.0:*:*:*:*:*:*:*", - "matchCriteriaId": "F22F1B02-CCF5-4770-A79B-1F58CA4321CE" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:9.0.48.0:*:*:*:*:*:*:*", - "matchCriteriaId": "93957171-F1F4-43ED-A8B9-2D36C81EB1F9" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:9.0.112.0:*:*:*:*:*:*:*", - "matchCriteriaId": "7AE89894-E492-4380-8A2B-4CDD3A15667A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:9.0.114.0:*:*:*:*:*:*:*", - "matchCriteriaId": "1C6ED706-BAF2-4795-B597-6F7EE8CA8911" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:9.0.115.0:*:*:*:*:*:*:*", - "matchCriteriaId": "260E2CF6-4D15-4168-A933-3EC52D8F93FF" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:9.0.124.0:*:*:*:*:*:*:*", - "matchCriteriaId": "D50BF190-2629-49A8-A377-4723C93FFB3E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:9.0.125.0:*:*:*:*:*:*:*", - "matchCriteriaId": "9E59E2AD-38BB-46DF-AC0D-D36F1F259AD4" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:9.0.151.0:*:*:*:*:*:*:*", - "matchCriteriaId": "DD04F04C-30CE-4A8D-B254-B10DEF62CEEE" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:9.0.152.0:*:*:*:*:*:*:*", - "matchCriteriaId": "96DC7742-499D-4BF5-9C5B-FCFF912A9892" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:9.0.155.0:*:*:*:*:*:*:*", - "matchCriteriaId": "BDD0A103-6D00-4D3D-9570-2DF74B6FE294" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:9.0.159.0:*:*:*:*:*:*:*", - "matchCriteriaId": "33AC4365-576C-487A-89C5-197A26D416C4" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:9.0.246.0:*:*:*:*:*:*:*", - "matchCriteriaId": "84B367AC-E1E1-4BC5-8BF4-D5B517C0CA7C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:9.0.260.0:*:*:*:*:*:*:*", - "matchCriteriaId": "A0A9C054-1F82-41DD-BE13-2B71B6F87F22" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:9.0.262.0:*:*:*:*:*:*:*", - "matchCriteriaId": "7CB0781E-D5B5-4576-ABD4-0EE1C0C3DF12" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:9.0.277.0:*:*:*:*:*:*:*", - "matchCriteriaId": "7AE15288-9344-41ED-B574-6DC4A4DDE386" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:9.0.283.0:*:*:*:*:*:*:*", - "matchCriteriaId": "84963C1D-06C1-4FBF-A3B8-EB14D2EB43DB" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:9.125.0:*:*:*:*:*:*:*", - "matchCriteriaId": "FE848097-01E6-4C9B-9593-282D55CC77D9" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:10.0.0.584:*:*:*:*:*:*:*", - "matchCriteriaId": "08E4028B-72E7-4E4A-AD0F-645F5AACAA29" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:10.0.12.10:*:*:*:*:*:*:*", - "matchCriteriaId": "63313ADA-3C52-47C8-9745-6BF6AEF0F6AD" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:10.0.12.36:*:*:*:*:*:*:*", - "matchCriteriaId": "BA646396-7C10-45A0-89A9-C75C5D8AFB3E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:10.0.15.3:*:*:*:*:*:*:*", - "matchCriteriaId": "476BB487-150A-4482-8C84-E6A2995A97E1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:10.0.22.87:*:*:*:*:*:*:*", - "matchCriteriaId": "3555324F-40F8-4BF4-BE5F-52A1E22B3AFA" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:10.0.32.18:*:*:*:*:*:*:*", - "matchCriteriaId": "60540FDE-8C31-4679-A85E-614B1EFE1FF0" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:10.0.42.34:*:*:*:*:*:*:*", - "matchCriteriaId": "AE652520-B693-47F1-A342-621C149A7430" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:10.0.45.2:*:*:*:*:*:*:*", - "matchCriteriaId": "D0EC3272-8E1E-4415-A254-BB6C7FB49BEC" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:10.1.52.14.1:*:*:*:*:*:*:*", - "matchCriteriaId": "0CF5AF16-A4F2-4E65-ADA8-DE11BE1F198D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:10.1.52.15:*:*:*:*:*:*:*", - "matchCriteriaId": "F7DF88E7-1A67-447C-BCF8-5C5564002207" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:10.1.53.64:*:*:*:*:*:*:*", - "matchCriteriaId": "460A0D6C-3A06-4910-B1E5-375E12F64F6E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:10.1.82.76:*:*:*:*:*:*:*", - "matchCriteriaId": "950D8316-8117-4C09-A2A9-B34191957D32" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:10.1.85.3:*:*:*:*:*:*:*", - "matchCriteriaId": "A5484DE8-3CB1-4591-BF30-0D5E255034E0" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:10.1.92.8:*:*:*:*:*:*:*", - "matchCriteriaId": "02EBACEB-1266-4A2C-A47E-066D12EE5B96" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:10.1.92.10:*:*:*:*:*:*:*", - "matchCriteriaId": "CA86C5B3-1FC9-4585-9566-862A0318AF2F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:10.1.95.1:*:*:*:*:*:*:*", - "matchCriteriaId": "CCC09395-A9C7-4D7F-9B55-3120A84CB427" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:10.1.95.2:*:*:*:*:*:*:*", - "matchCriteriaId": "3C2A6BBE-6033-4EF2-B890-9BD8867CC65A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:10.1.102.64:*:*:*:*:*:*:*", - "matchCriteriaId": "F3ACD1B2-F952-46C8-989A-C4744E16D5E6" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:10.2.152:*:*:*:*:*:*:*", - "matchCriteriaId": "E91594E8-5320-4B6A-A4D8-17BBF211A96E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:10.2.152.32:*:*:*:*:*:*:*", - "matchCriteriaId": "110ED819-CFFD-4DA6-BE13-08CDEFD17ADF" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:10.2.152.33:*:*:*:*:*:*:*", - "matchCriteriaId": "C3FD4968-B784-40D5-A09C-51F303A4C8C4" } ] }, @@ -464,23 +102,23 @@ "cpeMatch": [ { "vulnerable": false, - "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", - "matchCriteriaId": "0FF5999A-9D12-4CDD-8DE9-A89C10B2D574" + "criteria": "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4781BF1E-8A4E-4AFF-9540-23D523EE30DD" }, { "vulnerable": false, - "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", - "matchCriteriaId": "155AD4FB-E527-4103-BCEF-801B653DEA37" + "criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", + "matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1" }, { "vulnerable": false, - "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", - "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256" + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" }, { "vulnerable": false, - "criteria": "cpe:2.3:o:oracle:solaris:*:*:*:*:*:*:*:*", - "matchCriteriaId": "05924C67-F9A0-450E-A5B8-059651DD32E3" + "criteria": "cpe:2.3:o:oracle:solaris:-:*:*:*:*:*:*:*", + "matchCriteriaId": "91F372EA-3A78-4703-A457-751B2C98D796" } ] } @@ -498,26 +136,6 @@ "criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "versionEndIncluding": "10.1.106.16", "matchCriteriaId": "E6F057DF-F6F8-4D20-B32C-930CD93347C6" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:10.1.92.8:*:*:*:*:*:*:*", - "matchCriteriaId": "02EBACEB-1266-4A2C-A47E-066D12EE5B96" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:10.1.92.10:*:*:*:*:*:*:*", - "matchCriteriaId": "CA86C5B3-1FC9-4585-9566-862A0318AF2F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:10.1.95.2:*:*:*:*:*:*:*", - "matchCriteriaId": "3C2A6BBE-6033-4EF2-B890-9BD8867CC65A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:10.1.105.6:*:*:*:*:*:*:*", - "matchCriteriaId": "33B7290A-8A7E-496D-95C4-DADA2821859B" } ] }, @@ -527,8 +145,8 @@ "cpeMatch": [ { "vulnerable": false, - "criteria": "cpe:2.3:o:google:android:*:*:*:*:*:*:*:*", - "matchCriteriaId": "8255F035-04C8-4158-B301-82101711939C" + "criteria": "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F8B9FEC8-73B6-43B8-B24E-1F7C20D91D26" } ] } @@ -543,73 +161,10 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:9.0:*:*:*:*:*:*:*", - "matchCriteriaId": "5AA53564-9ACD-4CFB-9AAC-A77440026A57" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:9.1:*:*:*:*:*:*:*", - "matchCriteriaId": "C7EC46E3-77B7-4455-B3E0-A45C6B69B3DC" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:9.1.1:*:*:*:*:*:*:*", - "matchCriteriaId": "4F475858-DCE2-4C93-A51A-04718DF17593" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:9.1.2:*:*:*:*:*:*:*", - "matchCriteriaId": "88687272-4CD0-42A2-B727-C322ABDE3549" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:9.1.3:*:*:*:*:*:*:*", - "matchCriteriaId": "1E5C4FA4-3786-47AF-BD7D-8E75927EB3AA" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:9.2:*:*:*:*:*:*:*", - "matchCriteriaId": "B35CC915-EEE3-4E86-9E09-1893C725E07B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:9.3:*:*:*:*:*:*:*", - "matchCriteriaId": "76201694-E5C5-4CA3-8919-46937AFDAAE3" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:9.3.1:*:*:*:*:*:*:*", - "matchCriteriaId": "397AB988-1C2C-4247-9B34-806094197CB5" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:9.3.2:*:*:*:*:*:*:*", - "matchCriteriaId": "8FA0B8C3-8060-4685-A241-9852BD63B7A0" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:9.3.3:*:*:*:*:*:*:*", - "matchCriteriaId": "4AB9BBDE-634A-47CF-BA49-67382B547900" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:9.3.4:*:*:*:*:*:*:*", - "matchCriteriaId": "F56B1726-4F05-4732-9D8B-077EF593EAEC" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:9.4:*:*:*:*:*:*:*", - "matchCriteriaId": "A258374F-55CB-48D2-9094-CD70E1288F60" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:9.4.1:*:*:*:*:*:*:*", - "matchCriteriaId": "627B0DA4-E600-49F1-B455-B4E151B33236" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:9.4.2:*:*:*:*:*:*:*", - "matchCriteriaId": "54BD8F96-BB75-4961-B1E0-049F2273100D" + "criteria": "cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*", + "versionStartIncluding": "9.0", + "versionEndIncluding": "9.4.2", + "matchCriteriaId": "F3842B12-98F1-47D5-8EC2-F76BB6737D2D" }, { "vulnerable": true, @@ -623,73 +178,10 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:9.0:*:*:*:*:*:*:*", - "matchCriteriaId": "562772F1-1627-438E-A6B8-7D1AA5536086" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:9.1:*:*:*:*:*:*:*", - "matchCriteriaId": "27D5AF92-A8E1-41BD-B20A-EB26BB6AD4DE" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:9.1.1:*:*:*:*:*:*:*", - "matchCriteriaId": "F25C9167-C6D4-4264-9197-50878EDA2D96" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:9.1.2:*:*:*:*:*:*:*", - "matchCriteriaId": "DD1D7308-09E9-42B2-8836-DC2326C62A9E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:9.1.3:*:*:*:*:*:*:*", - "matchCriteriaId": "B5C251D2-4C9B-4029-8BED-0FCAED3B8E89" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:9.2:*:*:*:*:*:*:*", - "matchCriteriaId": "2432AC17-5378-4C61-A775-5172FD44EC03" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:9.3:*:*:*:*:*:*:*", - "matchCriteriaId": "B6BA82F4-470D-4A46-89B2-D2F3C8FA31C8" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:9.3.1:*:*:*:*:*:*:*", - "matchCriteriaId": "39EDED39-664F-4B68-B422-2CCCA3B83550" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:9.3.2:*:*:*:*:*:*:*", - "matchCriteriaId": "B508C5CE-1386-47B3-B301-B78DBB3A75D9" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:9.3.3:*:*:*:*:*:*:*", - "matchCriteriaId": "DDC2EEB6-D5EC-430F-962A-1279C9970441" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:9.3.4:*:*:*:*:*:*:*", - "matchCriteriaId": "8DC590C7-5BDE-4E46-9605-01E95B17F01F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:9.4:*:*:*:*:*:*:*", - "matchCriteriaId": "DCFE67F4-6907-4967-96A3-1757EADA72BB" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:9.4.1:*:*:*:*:*:*:*", - "matchCriteriaId": "41DFBB39-4BC6-48BB-B66E-99DA4C7DBCE4" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:9.4.2:*:*:*:*:*:*:*", - "matchCriteriaId": "A328CC7F-5D02-4C7C-82CE-139EB2689C18" + "criteria": "cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:*", + "versionStartIncluding": "9.0", + "versionEndIncluding": "9.4.2", + "matchCriteriaId": "C6EAD79A-9A1B-4EF4-9DC8-50FB4EF97718" }, { "vulnerable": true, @@ -709,13 +201,107 @@ "cpeMatch": [ { "vulnerable": false, - "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", - "matchCriteriaId": "0FF5999A-9D12-4CDD-8DE9-A89C10B2D574" + "criteria": "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4781BF1E-8A4E-4AFF-9540-23D523EE30DD" }, { "vulnerable": false, - "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", - "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256" + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*", + "versionEndIncluding": "2.5.1", + "matchCriteriaId": "3EA2B712-1B02-4BBA-A46C-00858320FD25" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*", + "matchCriteriaId": "A01C8B7E-EB19-40EA-B1D2-9AE5EA536C95" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*", + "matchCriteriaId": "5646FDE9-CF21-46A9-B89D-F5BBDB4249AF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*", + "matchCriteriaId": "DE554781-1EB9-446E-911F-6C11970C47F4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:suse:linux_enterprise:10.0:sp3:*:*:*:*:*:*", + "matchCriteriaId": "1193A7E6-DCB4-4E79-A509-1D6948153A57" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:suse:linux_enterprise:11.0:sp1:*:*:*:*:*:*", + "matchCriteriaId": "4500161F-13A0-4369-B93A-778B34E7F005" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.648.134", + "matchCriteriaId": "3EC8CA74-41F7-4449-8FAA-5B181E198529" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", + "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:google:chrome_os:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D32ACF6F-5FF7-4815-8EAD-4719F5FC9B79" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", + "matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" } ] } @@ -725,35 +311,60 @@ "references": [ { "url": "http://blogs.adobe.com/asset/2011/03/background-on-apsa11-01-patch-schedule.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Broken Link" + ] }, { "url": "http://googlechromereleases.blogspot.com/2011/03/stable-and-beta-channel-updates_15.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://secunia.com/advisories/43751", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Broken Link" + ] }, { "url": "http://secunia.com/advisories/43757", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Broken Link" + ] }, { "url": "http://secunia.com/advisories/43772", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Broken Link" + ] }, { "url": "http://secunia.com/advisories/43856", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Broken Link" + ] }, { "url": "http://securityreason.com/securityalert/8152", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.adobe.com/support/security/advisories/apsa11-01.html", @@ -764,58 +375,104 @@ }, { "url": "http://www.adobe.com/support/security/bulletins/apsb11-06.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Not Applicable" + ] }, { "url": "http://www.kb.cert.org/vuls/id/192052", "source": "psirt@adobe.com", "tags": [ + "Third Party Advisory", "US Government Resource" ] }, { "url": "http://www.redhat.com/support/errata/RHSA-2011-0372.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.securityfocus.com/bid/46860", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.securitytracker.com/id?1025210", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.securitytracker.com/id?1025211", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.securitytracker.com/id?1025238", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.vupen.com/english/advisories/2011/0655", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.vupen.com/english/advisories/2011/0656", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.vupen.com/english/advisories/2011/0688", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.vupen.com/english/advisories/2011/0732", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66078", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14147", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Broken Link" + ] } ] } \ No newline at end of file diff --git a/CVE-2011/CVE-2011-18xx/CVE-2011-1823.json b/CVE-2011/CVE-2011-18xx/CVE-2011-1823.json index d7db63fba1f..4e5c195b79d 100644 --- a/CVE-2011/CVE-2011-18xx/CVE-2011-1823.json +++ b/CVE-2011/CVE-2011-18xx/CVE-2011-1823.json @@ -2,8 +2,9 @@ "id": "CVE-2011-1823", "sourceIdentifier": "cve@mitre.org", "published": "2011-06-09T10:36:27.680", - "lastModified": "2023-11-07T02:07:14.530", - "vulnStatus": "Modified", + "lastModified": "2024-06-28T14:02:58.183", + "vulnStatus": "Analyzed", + "cveTags": [], "cisaExploitAdd": "2022-09-08", "cisaActionDue": "2022-09-29", "cisaRequiredAction": "Apply updates per vendor instructions.", @@ -19,6 +20,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -52,7 +75,7 @@ "description": [ { "lang": "en", - "value": "CWE-189" + "value": "CWE-190" } ] } @@ -66,53 +89,10 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:google:android:2.1:*:*:*:*:*:*:*", - "matchCriteriaId": "A33DBF65-09A6-4149-BABE-2FFFBF10C31D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:google:android:2.2:*:*:*:*:*:*:*", - "matchCriteriaId": "78B69434-13B2-4A43-AEB0-55E0ED403E54" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:google:android:2.2:rev1:*:*:*:*:*:*", - "matchCriteriaId": "D1755B91-1B6B-4A9E-BB6B-22B399A6DD02" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:google:android:2.2.1:*:*:*:*:*:*:*", - "matchCriteriaId": "1A92E88F-CCED-41D7-AFB7-CE1F9265E546" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:google:android:2.2.2:*:*:*:*:*:*:*", - "matchCriteriaId": "D13D3A00-27A0-4635-9D50-05CA81950691" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:google:android:2.2.3:*:*:*:*:*:*:*", - "matchCriteriaId": "4EB959DB-AFE7-4667-9662-949ADAB81CE3" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:google:android:2.3:rev1:*:*:*:*:*:*", - "matchCriteriaId": "61D64B87-F1F1-4E52-86AE-F28E2C43A9A8" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:google:android:2.3.1:*:*:*:*:*:*:*", - "matchCriteriaId": "83AB2497-59DE-4253-A758-A3D03FAEB913" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:google:android:2.3.2:*:*:*:*:*:*:*", - "matchCriteriaId": "6E197EC0-82DF-49D5-BD1A-7EA22EC0B806" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:google:android:2.3.3:*:*:*:*:*:*:*", - "matchCriteriaId": "286EED24-E011-4009-BC2E-B63CA06072CE" + "criteria": "cpe:2.3:o:google:android:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.0", + "versionEndExcluding": "2.3.4", + "matchCriteriaId": "92A56D64-F6E1-4EB6-9597-7AF04B97175F" }, { "vulnerable": true, @@ -127,37 +107,54 @@ "references": [ { "url": "http://android.git.kernel.org/?p=platform/system/core.git%3Ba=commit%3Bh=b620a0b1c7ae486e979826200e8e441605b0a5d6", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://android.git.kernel.org/?p=platform/system/netd.git%3Ba=commit%3Bh=79b579c92afc08ab12c0a5788d61f2dd2934836f", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://android.git.kernel.org/?p=platform/system/vold.git%3Ba=commit%3Bh=c51920c82463b240e2be0430849837d6fdc5352e", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://androidcommunity.com/gingerbreak-root-for-gingerbread-app-20110421/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://c-skills.blogspot.com/2011/04/yummy-yummy-gingerbreak.html", "source": "cve@mitre.org", "tags": [ - "Exploit" + "Exploit", + "Issue Tracking" ] }, { "url": "http://forum.xda-developers.com/showthread.php?t=1044765", "source": "cve@mitre.org", "tags": [ - "Exploit" + "Exploit", + "Issue Tracking" ] }, { "url": "http://www.androidpolice.com/2011/05/03/google-patches-gingerbreak-exploit-but-dont-worry-we-still-have-root-for-now/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Press/Media Coverage" + ] }, { "url": "http://xorl.wordpress.com/2011/04/28/android-vold-mpartminors-signedness-issue/", @@ -168,7 +165,11 @@ }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67977", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2011/CVE-2011-24xx/CVE-2011-2462.json b/CVE-2011/CVE-2011-24xx/CVE-2011-2462.json index 5ca09bb96d9..331d0a37a5e 100644 --- a/CVE-2011/CVE-2011-24xx/CVE-2011-2462.json +++ b/CVE-2011/CVE-2011-24xx/CVE-2011-2462.json @@ -2,8 +2,9 @@ "id": "CVE-2011-2462", "sourceIdentifier": "psirt@adobe.com", "published": "2011-12-07T19:55:01.673", - "lastModified": "2017-09-19T01:33:04.537", - "vulnStatus": "Modified", + "lastModified": "2024-06-28T14:21:09.670", + "vulnStatus": "Analyzed", + "cveTags": [], "cisaExploitAdd": "2022-06-08", "cisaActionDue": "2022-06-22", "cisaRequiredAction": "Apply updates per vendor instructions.", @@ -19,6 +20,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -52,7 +75,7 @@ "description": [ { "lang": "en", - "value": "NVD-CWE-noinfo" + "value": "CWE-787" } ] } @@ -65,356 +88,17 @@ "operator": "OR", "negate": false, "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*", + "versionEndIncluding": "10.1.1", + "matchCriteriaId": "A70868B3-F3C5-4DC0-9013-78E77F424109" + }, { "vulnerable": true, "criteria": "cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:*", "versionEndIncluding": "10.1.1", "matchCriteriaId": "68D60103-B447-48D2-9B52-81DEA719CEBE" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:3.0:*:*:*:*:*:*:*", - "matchCriteriaId": "B1C92642-7C8D-411A-8726-06A8A6483D65" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:3.01:*:*:*:*:*:*:*", - "matchCriteriaId": "3CBE2E6C-AF0E-4A77-9EB0-3593889BC676" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:3.02:*:*:*:*:*:*:*", - "matchCriteriaId": "4B5C5C14-383C-4630-858E-D40D6C32FD4B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:4.0:*:*:*:*:*:*:*", - "matchCriteriaId": "F509566A-6D4A-40C0-8A16-F8765C5DCAAF" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:4.0.5:*:*:*:*:*:*:*", - "matchCriteriaId": "707D7124-6063-4510-80B4-AD9675996F67" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:4.0.5a:*:*:*:*:*:*:*", - "matchCriteriaId": "200FFAE3-CC1C-4A11-99AD-377D54A67195" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:4.0.5c:*:*:*:*:*:*:*", - "matchCriteriaId": "8A990E86-07C0-49E2-92D6-55E499F30FAE" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:4.5:*:*:*:*:*:*:*", - "matchCriteriaId": "6AED985D-60D7-489E-9F1E-CE3C9D985B7A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:5.0:*:*:*:*:*:*:*", - "matchCriteriaId": "5F0FCA2F-FD7F-4CE5-9D45-324A7EC45105" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:5.0.5:*:*:*:*:*:*:*", - "matchCriteriaId": "EF7EAA22-CED2-4379-9465-9562BACB1C20" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:5.0.6:*:*:*:*:*:*:*", - "matchCriteriaId": "35B1CA6B-600C-4E03-B4D5-3D7E1BC4D0F9" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:5.0.7:*:*:*:*:*:*:*", - "matchCriteriaId": "F7AA1BA3-9FFA-46AB-A92A-7247D5F7EA06" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:5.0.9:*:*:*:*:*:*:*", - "matchCriteriaId": "3F5F7424-1E19-4078-8908-CD86A0185042" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:5.0.10:*:*:*:*:*:*:*", - "matchCriteriaId": "F2402B40-6B72-48B5-A376-DA8D16CA43FA" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:5.0.11:*:*:*:*:*:*:*", - "matchCriteriaId": "0D968113-340A-4E5A-B4FD-D9702D49E3DC" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:5.1:*:*:*:*:*:*:*", - "matchCriteriaId": "ACF742B8-5F7A-487B-835C-756B1BB392F4" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:6.0:*:*:*:*:*:*:*", - "matchCriteriaId": "C0BB7C0C-B1D6-4733-BA91-022A1A7FB2E2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:6.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "0B131DB8-4B6A-4AF2-8D5E-B5EA1AEBFB3B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:6.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "5B9351C2-16ED-4766-B417-8DB3A8766C2F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:6.0.3:*:*:*:*:*:*:*", - "matchCriteriaId": "74667860-0047-40AD-9468-860591BA9D17" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:6.0.4:*:*:*:*:*:*:*", - "matchCriteriaId": "5DEA092A-5532-4DCC-B43D-7A8ECF07FA4C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:6.0.5:*:*:*:*:*:*:*", - "matchCriteriaId": "9628AFF9-6EE1-4E85-858F-AE96EE64B7F4" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:7.0:*:*:*:*:*:*:*", - "matchCriteriaId": "6E2D0266-6954-4DBA-9EEE-8BF73B39DD61" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:7.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "24262AFA-2EC8-479E-8922-36DB4243E404" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:7.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "F1E62096-08B2-4722-A492-11E9A441E85B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:7.0.3:*:*:*:*:*:*:*", - "matchCriteriaId": "C5370AC6-90EE-48EA-8DBD-54002B102F7C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:7.0.4:*:*:*:*:*:*:*", - "matchCriteriaId": "C36D10A8-D211-437D-98D8-9029D0A9CF8B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:7.0.5:*:*:*:*:*:*:*", - "matchCriteriaId": "BA55D00C-3629-48E4-8699-F62B8D703E02" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:7.0.6:*:*:*:*:*:*:*", - "matchCriteriaId": "0EE5E1B7-7B91-4AE1-92AA-4F1763E1BA1E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:7.0.7:*:*:*:*:*:*:*", - "matchCriteriaId": "623324C2-C8B5-4C3C-9C10-9677D5A6740A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:7.0.8:*:*:*:*:*:*:*", - "matchCriteriaId": "B8EAF5E3-F3B4-4AD3-B5F1-281AB0F9C57F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:7.0.9:*:*:*:*:*:*:*", - "matchCriteriaId": "634396D6-4ED6-4F4D-9458-396373489589" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:7.1.0:*:*:*:*:*:*:*", - "matchCriteriaId": "9A265869-EF58-428E-B8BB-30CABCBE0A83" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:8.0:*:*:*:*:*:*:*", - "matchCriteriaId": "996EB48E-D2A8-49E4-915A-EBDE26A9FB94" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:8.1:*:*:*:*:*:*:*", - "matchCriteriaId": "97E20936-EE31-4CEB-A710-3165A28BAD69" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:8.1.1:*:*:*:*:*:*:*", - "matchCriteriaId": "5BD9952C-A1D0-4DFB-A292-9B86D7EAE5FD" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:8.1.2:*:*:*:*:*:*:*", - "matchCriteriaId": "C5BEA847-A71E-4336-AB67-B3C38847C1C3" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:8.1.4:*:*:*:*:*:*:*", - "matchCriteriaId": "39F6994B-6969-485B-9286-2592B11A47BF" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:8.1.5:*:*:*:*:*:*:*", - "matchCriteriaId": "FC533775-B52E-43F0-BF19-1473BE36232D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:8.1.6:*:*:*:*:*:*:*", - "matchCriteriaId": "18D1C85E-42CC-46F2-A7B6-DAC3C3995330" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:8.1.7:*:*:*:*:*:*:*", - "matchCriteriaId": "C4670451-511E-496C-A78A-887366E1E992" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:8.2:*:*:*:*:*:*:*", - "matchCriteriaId": "1A2A4F62-7AB5-4134-9A65-4B4E1EA262A3" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:8.2.1:*:*:*:*:*:*:*", - "matchCriteriaId": "35994F76-CD13-4301-9134-FC0CBEA37D97" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:8.2.2:*:*:*:*:*:*:*", - "matchCriteriaId": "0FB61191-F955-4DE6-A86B-36E031DE1F99" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:8.2.3:*:*:*:*:*:*:*", - "matchCriteriaId": "E32D68D5-6A79-454B-B14F-9BC865413E3B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:8.2.4:*:*:*:*:*:*:*", - "matchCriteriaId": "2A57581C-A139-41C3-B9DB-0C4CFA7A1BB2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:9:*:*:*:*:*:*:*", - "matchCriteriaId": "F234ECA6-375B-493B-A659-F013DAEE5B29" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:9.0:*:*:*:*:*:*:*", - "matchCriteriaId": "562772F1-1627-438E-A6B8-7D1AA5536086" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:9.1:*:*:*:*:*:*:*", - "matchCriteriaId": "27D5AF92-A8E1-41BD-B20A-EB26BB6AD4DE" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:9.1.1:*:*:*:*:*:*:*", - "matchCriteriaId": "F25C9167-C6D4-4264-9197-50878EDA2D96" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:9.1.2:*:*:*:*:*:*:*", - "matchCriteriaId": "DD1D7308-09E9-42B2-8836-DC2326C62A9E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:9.1.3:*:*:*:*:*:*:*", - "matchCriteriaId": "B5C251D2-4C9B-4029-8BED-0FCAED3B8E89" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:9.2:*:*:*:*:*:*:*", - "matchCriteriaId": "2432AC17-5378-4C61-A775-5172FD44EC03" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:9.3:*:*:*:*:*:*:*", - "matchCriteriaId": "B6BA82F4-470D-4A46-89B2-D2F3C8FA31C8" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:9.3.0:*:*:*:*:*:*:*", - "matchCriteriaId": "BCCA5699-BBF7-4112-B1E9-612A1CB260F6" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:9.3.1:*:*:*:*:*:*:*", - "matchCriteriaId": "39EDED39-664F-4B68-B422-2CCCA3B83550" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:9.3.2:*:*:*:*:*:*:*", - "matchCriteriaId": "B508C5CE-1386-47B3-B301-B78DBB3A75D9" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:9.3.3:*:*:*:*:*:*:*", - "matchCriteriaId": "DDC2EEB6-D5EC-430F-962A-1279C9970441" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:9.3.4:*:*:*:*:*:*:*", - "matchCriteriaId": "8DC590C7-5BDE-4E46-9605-01E95B17F01F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:9.4:*:*:*:*:*:*:*", - "matchCriteriaId": "DCFE67F4-6907-4967-96A3-1757EADA72BB" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:9.4.1:*:*:*:*:*:*:*", - "matchCriteriaId": "41DFBB39-4BC6-48BB-B66E-99DA4C7DBCE4" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:9.4.2:*:*:*:*:*:*:*", - "matchCriteriaId": "A328CC7F-5D02-4C7C-82CE-139EB2689C18" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:9.4.3:*:*:*:*:*:*:*", - "matchCriteriaId": "0F56EC75-4C65-4CD7-981D-823E1411CD6F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:9.4.4:*:*:*:*:*:*:*", - "matchCriteriaId": "1E2D30C1-BDE8-4C1C-A8B3-A635A74E5D94" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:10.0:*:*:*:*:*:*:*", - "matchCriteriaId": "9731EFE2-A5BE-4389-A92D-DDC573633B6C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:10.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "F9B4B357-27C7-4926-936C-A100A7AD538B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:10.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "4DEE3D3B-C94C-4A85-B2C2-E4A72A88F4FD" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:10.0.3:*:*:*:*:*:*:*", - "matchCriteriaId": "978027C8-4DF6-4C18-A31D-1ACFBA857E9F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:10.1:*:*:*:*:*:*:*", - "matchCriteriaId": "366E85EF-ED5F-4D4D-9CBE-E69F7248CB2B" } ] }, @@ -424,13 +108,13 @@ "cpeMatch": [ { "vulnerable": false, - "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", - "matchCriteriaId": "0FF5999A-9D12-4CDD-8DE9-A89C10B2D574" + "criteria": "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4781BF1E-8A4E-4AFF-9540-23D523EE30DD" }, { "vulnerable": false, - "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", - "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256" + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" } ] } @@ -445,354 +129,10 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*", - "versionEndIncluding": "10.1", - "matchCriteriaId": "56561144-6E0A-4C92-8E12-904EF8991E6D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:3.0:*:*:*:*:*:*:*", - "matchCriteriaId": "465F9134-DD86-4F13-8C39-949BE6E7389A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:3.1:*:*:*:*:*:*:*", - "matchCriteriaId": "BB041EDF-EFF8-4AA6-8D59-411975547534" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:4.0:*:*:*:*:*:*:*", - "matchCriteriaId": "4C05F6A5-0FB3-489B-9B8B-64C569C03D7A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:4.0.5:*:*:*:*:*:*:*", - "matchCriteriaId": "AABA4FE3-662B-4956-904D-45086E000890" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:4.0.5a:*:*:*:*:*:*:*", - "matchCriteriaId": "998CD79C-458E-46A8-8261-1C40C53D9FA5" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:4.0.5c:*:*:*:*:*:*:*", - "matchCriteriaId": "0155FB0B-7FAD-4388-96C8-A8543B4FDFD9" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:5.0:*:*:*:*:*:*:*", - "matchCriteriaId": "201F059D-33D1-4D9F-9C6F-FC8EB49E4735" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:5.0.5:*:*:*:*:*:*:*", - "matchCriteriaId": "B025E795-5713-485E-8A15-EBE4451A1A46" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:5.0.6:*:*:*:*:*:*:*", - "matchCriteriaId": "B453FA1D-0FE9-4324-9644-E167561926C2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:5.0.10:*:*:*:*:*:*:*", - "matchCriteriaId": "FDEA946E-B6D2-463B-89D0-F2F37278089E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:6.0:*:*:*:*:*:*:*", - "matchCriteriaId": "183B5940-2310-4D2E-99F0-9792A801A442" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:6.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "4F8BB13E-2732-4F9E-A588-EA1C00893C8B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:6.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "E5FCDCBF-597B-439C-8D8B-2819FC70C567" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:6.0.3:*:*:*:*:*:*:*", - "matchCriteriaId": "440B890A-90E9-4456-B92A-856CD17F0C78" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:6.0.4:*:*:*:*:*:*:*", - "matchCriteriaId": "79BD9D8D-39DA-403E-915D-E1B6A46A6BAB" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:6.0.5:*:*:*:*:*:*:*", - "matchCriteriaId": "8976A7DC-1314-4C4A-A7C5-AA789D2DAB9C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:6.0.6:*:*:*:*:*:*:*", - "matchCriteriaId": "37854E7C-2166-48D7-AE8C-44C9468C38C7" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:7:*:*:*:*:*:*:*", - "matchCriteriaId": "0BCC8097-2B97-424F-BA92-23D9FFD28E80" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:7.0:*:*:*:*:*:*:*", - "matchCriteriaId": "FECFC942-4F04-420C-A9B4-AE0C0590317F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:7.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "F81817F2-1E3A-4A52-88F1-6B614A2A1F0A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:7.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "CFFFFF0D-A80F-4B67-BEE2-86868EF7AA37" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:7.0.3:*:*:*:*:*:*:*", - "matchCriteriaId": "1DC97A87-2652-4AD6-8E10-419A9AC9C245" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:7.0.4:*:*:*:*:*:*:*", - "matchCriteriaId": "3E1F71AE-3591-499E-B09F-AAC4E38F1CF2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:7.0.5:*:*:*:*:*:*:*", - "matchCriteriaId": "2D75174C-EBF9-4117-9E66-80E847012853" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:7.0.6:*:*:*:*:*:*:*", - "matchCriteriaId": "69B0305A-51D3-4E09-B96C-54B0ED921DA3" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:7.0.7:*:*:*:*:*:*:*", - "matchCriteriaId": "9762FE57-837B-4FFA-9813-AC038450EB2B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:7.0.8:*:*:*:*:*:*:*", - "matchCriteriaId": "0055A38C-E421-40A1-8BC7-11856A20B8F0" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:7.0.9:*:*:*:*:*:*:*", - "matchCriteriaId": "758CC9EE-8929-405B-A845-83BAAECCB2AD" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:7.1.0:*:*:*:*:*:*:*", - "matchCriteriaId": "24A7CF98-27EC-406A-98E2-ACC1AAAF5C93" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:7.1.1:*:*:*:*:*:*:*", - "matchCriteriaId": "BC1BD70D-7A92-4309-A40C-9BD500997390" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:7.1.2:*:*:*:*:*:*:*", - "matchCriteriaId": "F9C17896-8895-4731-B77A-F488A94F0CBD" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:7.1.3:*:*:*:*:*:*:*", - "matchCriteriaId": "21AC1961-12F7-456F-9CE4-9AAF116CF141" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:7.1.4:*:*:*:*:*:*:*", - "matchCriteriaId": "DF9F1050-B6BE-4B99-882B-36D6E187304D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:8:*:*:*:*:*:*:*", - "matchCriteriaId": "4AEF32A2-8118-4557-B47F-4DB57F382814" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:8.0:*:*:*:*:*:*:*", - "matchCriteriaId": "26AE76F7-D7F6-4AF2-A5C6-708B5642C288" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:8.1:*:*:*:*:*:*:*", - "matchCriteriaId": "749FFB51-65D4-4A4B-95F3-742440276897" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:8.1.1:*:*:*:*:*:*:*", - "matchCriteriaId": "C8665E53-EC1E-4B95-9064-2565BC12113E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:8.1.2:*:*:*:*:*:*:*", - "matchCriteriaId": "24218FDA-F9DA-465A-B5D5-76A55C7EE04E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:8.1.3:*:*:*:*:*:*:*", - "matchCriteriaId": "E2C5F1C5-85CD-47B9-897F-E51D6902AF72" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:8.1.4:*:*:*:*:*:*:*", - "matchCriteriaId": "E0E190FF-3EBC-44AB-8072-4D964E843E8A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:8.1.5:*:*:*:*:*:*:*", - "matchCriteriaId": "6A624D44-C135-4ED3-9BA4-F4F8A044850B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:8.1.6:*:*:*:*:*:*:*", - "matchCriteriaId": "B95C0A99-42E4-40A9-BF61-507E4E4DC052" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:8.1.7:*:*:*:*:*:*:*", - "matchCriteriaId": "3B9F55CC-3681-4A67-99D1-3F40447392D5" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:8.2:*:*:*:*:*:*:*", - "matchCriteriaId": "A9C0AC89-804B-44A1-929A-118993B6BAA7" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:8.2.1:*:*:*:*:*:*:*", - "matchCriteriaId": "39B174C3-1BA6-4654-BFA4-CC126454E147" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:8.2.2:*:*:*:*:*:*:*", - "matchCriteriaId": "6ACDAA2B-3977-4590-9F16-5DDB6FF6545B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:8.2.3:*:*:*:*:*:*:*", - "matchCriteriaId": "BB7C4E07-0909-4114-BBFB-92626AFC49BB" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:8.2.4:*:*:*:*:*:*:*", - "matchCriteriaId": "7832B75B-7868-44DE-A9A4-CBD9CC117DB4" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:9:*:*:*:*:*:*:*", - "matchCriteriaId": "37AF9870-B9F0-42D2-B2D1-4A7E569A4C73" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:9.0:*:*:*:*:*:*:*", - "matchCriteriaId": "5AA53564-9ACD-4CFB-9AAC-A77440026A57" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:9.1:*:*:*:*:*:*:*", - "matchCriteriaId": "C7EC46E3-77B7-4455-B3E0-A45C6B69B3DC" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:9.1.1:*:*:*:*:*:*:*", - "matchCriteriaId": "4F475858-DCE2-4C93-A51A-04718DF17593" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:9.1.2:*:*:*:*:*:*:*", - "matchCriteriaId": "88687272-4CD0-42A2-B727-C322ABDE3549" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:9.1.3:*:*:*:*:*:*:*", - "matchCriteriaId": "1E5C4FA4-3786-47AF-BD7D-8E75927EB3AA" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:9.2:*:*:*:*:*:*:*", - "matchCriteriaId": "B35CC915-EEE3-4E86-9E09-1893C725E07B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:9.3:*:*:*:*:*:*:*", - "matchCriteriaId": "76201694-E5C5-4CA3-8919-46937AFDAAE3" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:9.3.1:*:*:*:*:*:*:*", - "matchCriteriaId": "397AB988-1C2C-4247-9B34-806094197CB5" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:9.3.2:*:*:*:*:*:*:*", - "matchCriteriaId": "8FA0B8C3-8060-4685-A241-9852BD63B7A0" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:9.3.3:*:*:*:*:*:*:*", - "matchCriteriaId": "4AB9BBDE-634A-47CF-BA49-67382B547900" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:9.3.4:*:*:*:*:*:*:*", - "matchCriteriaId": "F56B1726-4F05-4732-9D8B-077EF593EAEC" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:9.4:*:*:*:*:*:*:*", - "matchCriteriaId": "A258374F-55CB-48D2-9094-CD70E1288F60" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:9.4.1:*:*:*:*:*:*:*", - "matchCriteriaId": "627B0DA4-E600-49F1-B455-B4E151B33236" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:9.4.2:*:*:*:*:*:*:*", - "matchCriteriaId": "54BD8F96-BB75-4961-B1E0-049F2273100D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:9.4.3:*:*:*:*:*:*:*", - "matchCriteriaId": "9C14B310-65F0-475D-A2DD-0AD706805A99" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:9.4.4:*:*:*:*:*:*:*", - "matchCriteriaId": "356A0FAF-A25C-4D11-A70F-94B311B5778E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:10.0:*:*:*:*:*:*:*", - "matchCriteriaId": "B57C5136-7853-478B-A342-6013528B41B4" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:10.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "CC1E1EE7-379E-4047-962D-0A311EB0DB1A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:10.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "C113D6BE-88CD-4670-A0FA-8E78EBAF9A81" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:10.0.3:*:*:*:*:*:*:*", - "matchCriteriaId": "E4FC7DF0-7006-4805-9CA3-9A950DAA8D51" + "criteria": "cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:*", + "versionStartIncluding": "9.0", + "versionEndIncluding": "9.4.6", + "matchCriteriaId": "0142C12E-A8F0-4E88-AECE-88F068E5E874" } ] }, @@ -802,225 +142,8 @@ "cpeMatch": [ { "vulnerable": false, - "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", - "matchCriteriaId": "0FF5999A-9D12-4CDD-8DE9-A89C10B2D574" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", - "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256" - } - ] - } - ] - }, - { - "operator": "AND", - "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:9.0:*:*:*:*:*:*:*", - "matchCriteriaId": "5AA53564-9ACD-4CFB-9AAC-A77440026A57" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:9.1:*:*:*:*:*:*:*", - "matchCriteriaId": "C7EC46E3-77B7-4455-B3E0-A45C6B69B3DC" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:9.1.1:*:*:*:*:*:*:*", - "matchCriteriaId": "4F475858-DCE2-4C93-A51A-04718DF17593" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:9.1.2:*:*:*:*:*:*:*", - "matchCriteriaId": "88687272-4CD0-42A2-B727-C322ABDE3549" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:9.1.3:*:*:*:*:*:*:*", - "matchCriteriaId": "1E5C4FA4-3786-47AF-BD7D-8E75927EB3AA" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:9.2:*:*:*:*:*:*:*", - "matchCriteriaId": "B35CC915-EEE3-4E86-9E09-1893C725E07B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:9.3:*:*:*:*:*:*:*", - "matchCriteriaId": "76201694-E5C5-4CA3-8919-46937AFDAAE3" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:9.3.1:*:*:*:*:*:*:*", - "matchCriteriaId": "397AB988-1C2C-4247-9B34-806094197CB5" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:9.3.2:*:*:*:*:*:*:*", - "matchCriteriaId": "8FA0B8C3-8060-4685-A241-9852BD63B7A0" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:9.3.3:*:*:*:*:*:*:*", - "matchCriteriaId": "4AB9BBDE-634A-47CF-BA49-67382B547900" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:9.3.4:*:*:*:*:*:*:*", - "matchCriteriaId": "F56B1726-4F05-4732-9D8B-077EF593EAEC" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:9.4:*:*:*:*:*:*:*", - "matchCriteriaId": "A258374F-55CB-48D2-9094-CD70E1288F60" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:9.4.1:*:*:*:*:*:*:*", - "matchCriteriaId": "627B0DA4-E600-49F1-B455-B4E151B33236" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:9.4.2:*:*:*:*:*:*:*", - "matchCriteriaId": "54BD8F96-BB75-4961-B1E0-049F2273100D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:9.4.3:*:*:*:*:*:*:*", - "matchCriteriaId": "9C14B310-65F0-475D-A2DD-0AD706805A99" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:9.4.4:*:*:*:*:*:*:*", - "matchCriteriaId": "356A0FAF-A25C-4D11-A70F-94B311B5778E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:9.4.5:*:*:*:*:*:*:*", - "matchCriteriaId": "958768B5-ABA3-4843-986D-499AD480832B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:9.4.6:*:*:*:*:*:*:*", - "matchCriteriaId": "0335CEAA-ED55-46AA-98D9-693733CDA68C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:9.0:*:*:*:*:*:*:*", - "matchCriteriaId": "562772F1-1627-438E-A6B8-7D1AA5536086" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:9.1:*:*:*:*:*:*:*", - "matchCriteriaId": "27D5AF92-A8E1-41BD-B20A-EB26BB6AD4DE" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:9.1.1:*:*:*:*:*:*:*", - "matchCriteriaId": "F25C9167-C6D4-4264-9197-50878EDA2D96" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:9.1.2:*:*:*:*:*:*:*", - "matchCriteriaId": "DD1D7308-09E9-42B2-8836-DC2326C62A9E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:9.1.3:*:*:*:*:*:*:*", - "matchCriteriaId": "B5C251D2-4C9B-4029-8BED-0FCAED3B8E89" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:9.2:*:*:*:*:*:*:*", - "matchCriteriaId": "2432AC17-5378-4C61-A775-5172FD44EC03" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:9.3:*:*:*:*:*:*:*", - "matchCriteriaId": "B6BA82F4-470D-4A46-89B2-D2F3C8FA31C8" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:9.3.1:*:*:*:*:*:*:*", - "matchCriteriaId": "39EDED39-664F-4B68-B422-2CCCA3B83550" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:9.3.2:*:*:*:*:*:*:*", - "matchCriteriaId": "B508C5CE-1386-47B3-B301-B78DBB3A75D9" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:9.3.3:*:*:*:*:*:*:*", - "matchCriteriaId": "DDC2EEB6-D5EC-430F-962A-1279C9970441" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:9.3.4:*:*:*:*:*:*:*", - "matchCriteriaId": "8DC590C7-5BDE-4E46-9605-01E95B17F01F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:9.4:*:*:*:*:*:*:*", - "matchCriteriaId": "DCFE67F4-6907-4967-96A3-1757EADA72BB" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:9.4.1:*:*:*:*:*:*:*", - "matchCriteriaId": "41DFBB39-4BC6-48BB-B66E-99DA4C7DBCE4" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:9.4.2:*:*:*:*:*:*:*", - "matchCriteriaId": "A328CC7F-5D02-4C7C-82CE-139EB2689C18" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:9.4.3:*:*:*:*:*:*:*", - "matchCriteriaId": "0F56EC75-4C65-4CD7-981D-823E1411CD6F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:9.4.4:*:*:*:*:*:*:*", - "matchCriteriaId": "1E2D30C1-BDE8-4C1C-A8B3-A635A74E5D94" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:9.4.5:*:*:*:*:*:*:*", - "matchCriteriaId": "CB6F49FE-2332-4CAF-A11D-CDE46A71447F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:9.4.6:*:*:*:*:*:*:*", - "matchCriteriaId": "5D0D8BBD-F727-4957-8128-10A4C456FBD0" - } - ] - }, - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": false, - "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", - "matchCriteriaId": "0FF5999A-9D12-4CDD-8DE9-A89C10B2D574" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", - "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:o:unix:unix:*:*:*:*:*:*:*:*", - "matchCriteriaId": "F7A7C398-5356-45D6-AA5C-53E63BC88DCA" + "criteria": "cpe:2.3:o:opengroup:unix:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6A90CB3A-9BE7-475C-9E75-6ECAD2106302" } ] } @@ -1030,11 +153,17 @@ "references": [ { "url": "http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00019.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Broken Link" + ] }, { "url": "http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00020.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.adobe.com/support/security/advisories/apsa11-04.html", @@ -1045,26 +174,39 @@ }, { "url": "http://www.adobe.com/support/security/bulletins/apsb11-30.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Not Applicable" + ] }, { "url": "http://www.adobe.com/support/security/bulletins/apsb12-01.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Not Applicable" + ] }, { "url": "http://www.redhat.com/support/errata/RHSA-2012-0011.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.us-cert.gov/cas/techalerts/TA11-350A.html", "source": "psirt@adobe.com", "tags": [ + "Third Party Advisory", "US Government Resource" ] }, { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14562", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Broken Link" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-01xx/CVE-2012-0151.json b/CVE-2012/CVE-2012-01xx/CVE-2012-0151.json index 351d2d8c75b..bc237f4a60a 100644 --- a/CVE-2012/CVE-2012-01xx/CVE-2012-0151.json +++ b/CVE-2012/CVE-2012-01xx/CVE-2012-0151.json @@ -2,8 +2,9 @@ "id": "CVE-2012-0151", "sourceIdentifier": "secure@microsoft.com", "published": "2012-04-10T21:55:01.597", - "lastModified": "2023-12-07T18:38:56.693", - "vulnStatus": "Modified", + "lastModified": "2024-06-28T14:18:07.717", + "vulnStatus": "Analyzed", + "cveTags": [], "cisaExploitAdd": "2022-06-08", "cisaActionDue": "2022-06-22", "cisaRequiredAction": "Apply updates per vendor instructions.", @@ -19,6 +20,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -122,35 +145,104 @@ ] } ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*", + "matchCriteriaId": "C2B1C231-DE19-4B8F-A4AA-5B3A65276E46" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:*:*", + "matchCriteriaId": "1D929AA2-EE0B-4AA1-805D-69BCCA11B77F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", + "matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:*:*:*:*:*:*:*", + "matchCriteriaId": "36559BC0-44D7-48B3-86FF-1BFF0257B5ED" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*", + "matchCriteriaId": "2ACA9287-B475-4AF7-A4DA-A7143CEF9E57" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*", + "matchCriteriaId": "BF1AD1A1-EE20-4BCE-9EE6-84B27139811C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:professional:*:x64:*", + "matchCriteriaId": "C6109348-BC79-4ED3-8D41-EA546A540C79" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:*:*:*:*", + "matchCriteriaId": "C9392D35-7BF5-48E9-879B-BBDE9A9E9AB9" + } + ] + } + ] } ], "references": [ { "url": "http://osvdb.org/81135", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Broken Link" + ] }, { "url": "http://secunia.com/advisories/48581", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.securitytracker.com/id?1026906", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.us-cert.gov/cas/techalerts/TA12-101A.html", "source": "secure@microsoft.com", "tags": [ + "Third Party Advisory", "US Government Resource" ] }, { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-024", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] }, { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15594", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Broken Link" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-18xx/CVE-2012-1889.json b/CVE-2012/CVE-2012-18xx/CVE-2012-1889.json index bf5c3ff4814..ada8416003b 100644 --- a/CVE-2012/CVE-2012-18xx/CVE-2012-1889.json +++ b/CVE-2012/CVE-2012-18xx/CVE-2012-1889.json @@ -2,8 +2,9 @@ "id": "CVE-2012-1889", "sourceIdentifier": "secure@microsoft.com", "published": "2012-06-13T04:46:46.190", - "lastModified": "2023-12-07T18:38:56.693", - "vulnStatus": "Modified", + "lastModified": "2024-06-28T14:18:20.617", + "vulnStatus": "Analyzed", + "cveTags": [], "cisaExploitAdd": "2022-06-08", "cisaActionDue": "2022-06-22", "cisaRequiredAction": "Apply updates per vendor instructions.", @@ -19,6 +20,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -52,7 +75,7 @@ "description": [ { "lang": "en", - "value": "CWE-119" + "value": "CWE-787" } ] } @@ -86,26 +109,6 @@ "operator": "OR", "negate": false, "cpeMatch": [ - { - "vulnerable": false, - "criteria": "cpe:2.3:o:microsoft:windows_7:*:*:x64:*:*:*:*:*", - "matchCriteriaId": "CE381783-027E-4B6D-B801-59873E5EA483" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:o:microsoft:windows_7:*:*:x86:*:*:*:*:*", - "matchCriteriaId": "A2C3594F-7C2C-4E2D-9BC5-F4F89B7BF4D5" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:o:microsoft:windows_7:*:sp1:x64:*:*:*:*:*", - "matchCriteriaId": "4FA15D65-7C32-4C7A-9915-746AB3F454EE" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:o:microsoft:windows_7:*:sp1:x86:*:*:*:*:*", - "matchCriteriaId": "976EFC05-9B37-4661-AD34-4FFDB5AB48E0" - }, { "vulnerable": false, "criteria": "cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:*", @@ -113,53 +116,43 @@ }, { "vulnerable": false, - "criteria": "cpe:2.3:o:microsoft:windows_7:-:sp1:x64:*:*:*:*:*", - "matchCriteriaId": "F282E5E8-A5C9-4092-B0BF-07A5A2CAA6F4" + "criteria": "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*", + "matchCriteriaId": "C2B1C231-DE19-4B8F-A4AA-5B3A65276E46" }, { "vulnerable": false, - "criteria": "cpe:2.3:o:microsoft:windows_7:-:sp1:x86:*:*:*:*:*", - "matchCriteriaId": "D16A8D29-57BF-4B74-85F2-24DBD8B52BBF" + "criteria": "cpe:2.3:o:microsoft:windows_8:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0D229E41-A971-4284-9657-16D78414B93F" }, { "vulnerable": false, - "criteria": "cpe:2.3:o:microsoft:windows_server_2003:*:sp2:*:*:*:*:*:*", - "matchCriteriaId": "4D3B5E4F-56A6-4696-BBB4-19DF3613D020" + "criteria": "cpe:2.3:o:microsoft:windows_server_2003:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E3527F41-A6ED-437D-9833-458A2C60C2A3" }, { "vulnerable": false, - "criteria": "cpe:2.3:o:microsoft:windows_server_2008:*:sp2:itanium:*:*:*:*:*", - "matchCriteriaId": "7C684420-1614-4DAE-9BD9-F1FE9102A50F" + "criteria": "cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:*:*", + "matchCriteriaId": "1D929AA2-EE0B-4AA1-805D-69BCCA11B77F" }, { "vulnerable": false, - "criteria": "cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x64:*:*:*:*:*", - "matchCriteriaId": "FFF81F4B-7D92-4398-8658-84530FB8F518" + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", + "matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C" }, { "vulnerable": false, - "criteria": "cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x86:*:*:*:*:*", - "matchCriteriaId": "32C28EC2-8A34-4E30-A76A-86921D7332C1" + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:*:*:*:*:*:x64:*", + "matchCriteriaId": "B7674920-AE12-4A25-BE57-34AEDDA74D76" }, { "vulnerable": false, - "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:itanium:*:*:*:*:*", - "matchCriteriaId": "7AE15F6C-80F6-43A6-86DA-B92116A697A0" + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*", + "matchCriteriaId": "2ACA9287-B475-4AF7-A4DA-A7143CEF9E57" }, { "vulnerable": false, - "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:*:itanium:*:*:*:*:*", - "matchCriteriaId": "CC916D5A-0644-4423-A52E-D4310906BE78" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:*:x64:*:*:*:*:*", - "matchCriteriaId": "95DC297F-06DB-4FB3-BFB6-7312C059E047" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*", - "matchCriteriaId": "0A0D2704-C058-420B-B368-372D1129E914" + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074" }, { "vulnerable": false, @@ -168,13 +161,8 @@ }, { "vulnerable": false, - "criteria": "cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*", - "matchCriteriaId": "CE477A73-4EE4-41E9-8694-5A3D5DC88656" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:o:microsoft:windows_xp:-:sp2:x64:*:*:*:*:*", - "matchCriteriaId": "FFAC3F90-77BF-4F56-A89B-8A3D2D1FC6D6" + "criteria": "cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:*:*:*:*", + "matchCriteriaId": "C9392D35-7BF5-48E9-879B-BBDE9A9E9AB9" } ] } @@ -198,6 +186,36 @@ "operator": "OR", "negate": false, "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:a:microsoft:expression_web:2:*:*:*:*:*:*:*", + "matchCriteriaId": "F6761A1C-EC1C-4B00-8126-D58DAB51267A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:a:microsoft:expression_web:sp1:*:*:*:*:*:*:*", + "matchCriteriaId": "8038BCE0-23C5-4A73-B4B3-A1143DE9C1A1" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:a:microsoft:groove:2007:sp2:*:*:*:*:*:*", + "matchCriteriaId": "5075B5F5-5018-4DEF-B77D-E75C09CB3DF3" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:a:microsoft:groove:2007:sp3:*:*:*:*:*:*", + "matchCriteriaId": "F73CE423-638E-406F-AD0A-84049B56DA8C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:a:microsoft:groove_server:2007:sp2:*:*:*:*:*:*", + "matchCriteriaId": "8D61B21F-E1A1-421A-BA3E-5D0D294A4325" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:a:microsoft:groove_server:2007:sp3:*:*:*:*:*:*", + "matchCriteriaId": "11874823-F6B3-4948-9A7B-FA903EF31005" + }, { "vulnerable": false, "criteria": "cpe:2.3:a:microsoft:office:2003:sp3:*:*:*:*:*:*", @@ -212,6 +230,31 @@ "vulnerable": false, "criteria": "cpe:2.3:a:microsoft:office:2007:sp3:*:*:*:*:*:*", "matchCriteriaId": "FEECD12A-5BEF-4675-B62E-86CF4A7474D7" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:a:microsoft:office_compatibility_pack:-:sp2:*:*:*:*:*:*", + "matchCriteriaId": "55AA5CC4-AF80-49A2-ACD1-5644AA971044" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:a:microsoft:office_compatibility_pack:-:sp3:*:*:*:*:*:*", + "matchCriteriaId": "71AF058A-2E5D-4B11-88DB-8903C64B13C1" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:a:microsoft:office_word_viewer:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C64B2636-8F96-48BA-921F-A8FA0E62DE63" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:a:microsoft:sharepoint_server:2007:sp2:*:*:*:*:*:*", + "matchCriteriaId": "9C24FB09-DBAD-4F62-BBD6-B81B9EC83D56" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:a:microsoft:sharepoint_server:2007:sp3:*:*:*:*:*:*", + "matchCriteriaId": "6B7AEA5E-C3D7-4E6D-96F0-5F9A175631C9" } ] } @@ -230,6 +273,7 @@ "url": "http://www.us-cert.gov/cas/techalerts/TA12-174A.html", "source": "secure@microsoft.com", "tags": [ + "Third Party Advisory", "US Government Resource" ] }, @@ -237,16 +281,24 @@ "url": "http://www.us-cert.gov/cas/techalerts/TA12-192A.html", "source": "secure@microsoft.com", "tags": [ + "Third Party Advisory", "US Government Resource" ] }, { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-043", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] }, { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15195", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Broken Link" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-50xx/CVE-2012-5054.json b/CVE-2012/CVE-2012-50xx/CVE-2012-5054.json index d5bf6d972e9..e29d23359d0 100644 --- a/CVE-2012/CVE-2012-50xx/CVE-2012-5054.json +++ b/CVE-2012/CVE-2012-50xx/CVE-2012-5054.json @@ -2,8 +2,9 @@ "id": "CVE-2012-5054", "sourceIdentifier": "psirt@adobe.com", "published": "2012-09-24T17:55:07.217", - "lastModified": "2018-10-30T16:26:24.687", - "vulnStatus": "Modified", + "lastModified": "2024-06-28T14:21:19.573", + "vulnStatus": "Analyzed", + "cveTags": [], "cisaExploitAdd": "2022-06-08", "cisaActionDue": "2022-06-22", "cisaRequiredAction": "The impacted product is end-of-life and should be disconnected if still in use.", @@ -19,6 +20,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -52,7 +75,7 @@ "description": [ { "lang": "en", - "value": "CWE-189" + "value": "CWE-190" } ] } @@ -67,683 +90,8 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", - "versionEndIncluding": "11.3.300.271", - "matchCriteriaId": "16CA5E4D-0242-4700-935B-A5DA63E5C3A3" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:2:*:*:*:*:*:*:*", - "matchCriteriaId": "8E735284-35A6-41C1-B1BC-3360901B4017" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:3:*:*:*:*:*:*:*", - "matchCriteriaId": "610DB42B-E05B-4CD5-A516-71C30CA05CAC" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:4:*:*:*:*:*:*:*", - "matchCriteriaId": "9E1C6CCD-039A-4AB0-BFF3-8A894F8FEC14" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:5:*:*:*:*:*:*:*", - "matchCriteriaId": "D556A03C-E5A9-44BB-A777-2BF0FD628108" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:6:*:*:*:*:*:*:*", - "matchCriteriaId": "99A37266-4196-4E60-B099-8988979F9BEC" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:6.0.21.0:*:*:*:*:*:*:*", - "matchCriteriaId": "7143E94B-F3CD-4E32-A7BB-C72C816EEACA" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:6.0.79:*:*:*:*:*:*:*", - "matchCriteriaId": "4654752C-F677-4066-8C48-BAD09392A594" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:7.0:*:*:*:*:*:*:*", - "matchCriteriaId": "DDFF4A51-C936-4C5B-8276-FD454C9E4F40" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:7.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "D5ECC9D7-3386-4FEA-9218-91E31FF90F3A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:7.0.14.0:*:*:*:*:*:*:*", - "matchCriteriaId": "6E81EA32-9621-4ACE-9191-2E9B8C24D500" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:7.0.19.0:*:*:*:*:*:*:*", - "matchCriteriaId": "3B0E10D6-6348-471B-918A-60AAE2AC5F86" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:7.0.24.0:*:*:*:*:*:*:*", - "matchCriteriaId": "F7FBE855-7EE3-46F2-9FA1-0366AC8C5D24" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:7.0.25:*:*:*:*:*:*:*", - "matchCriteriaId": "F0E93289-6EE0-401A-958D-F59D2CDAE2F1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:7.0.53.0:*:*:*:*:*:*:*", - "matchCriteriaId": "A67FC00F-0C85-4DD7-81EA-65533EABC767" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:7.0.60.0:*:*:*:*:*:*:*", - "matchCriteriaId": "14E67AD7-0791-4D5D-A3B2-E173088B5228" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:7.0.61.0:*:*:*:*:*:*:*", - "matchCriteriaId": "EAF07696-9C85-470E-B608-1B0193CAFB6D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:7.0.63:*:*:*:*:*:*:*", - "matchCriteriaId": "0FA3E556-BF8F-4D30-8DE5-09DA3FD8D5C3" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:7.0.66.0:*:*:*:*:*:*:*", - "matchCriteriaId": "C0DC1B9D-686D-46A3-B9F4-DD4E078DF74D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:7.0.67.0:*:*:*:*:*:*:*", - "matchCriteriaId": "4BC3ABBA-8B36-448D-883B-C675C202028A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:7.0.68.0:*:*:*:*:*:*:*", - "matchCriteriaId": "EF2A52D9-0A1C-4E53-AFA2-148FF03D23A3" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:7.0.69.0:*:*:*:*:*:*:*", - "matchCriteriaId": "A82D5B56-44E0-4120-B73E-0A1155AF4B05" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:7.0.70.0:*:*:*:*:*:*:*", - "matchCriteriaId": "8E895107-ED8A-4F88-87C3-935EAE299C01" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:7.0.73.0:*:*:*:*:*:*:*", - "matchCriteriaId": "1752F67C-75A9-4226-AB30-A94EB6C85526" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:7.0_r67:*:*:*:*:*:*:*", - "matchCriteriaId": "7AB20235-B2F2-426E-B797-BFA361CEC488" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:7.1:*:*:*:*:*:*:*", - "matchCriteriaId": "4007D621-A0BC-4927-82A7-10D73802BCF8" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:7.1.1:*:*:*:*:*:*:*", - "matchCriteriaId": "641776AE-5408-439E-8290-DD9324771874" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:7.2:*:*:*:*:*:*:*", - "matchCriteriaId": "138A932A-D775-46A2-86EC-3C03C96884C4" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:8.0:*:*:*:*:*:*:*", - "matchCriteriaId": "D12E3957-D7B2-4F3B-BB64-8B50B8958DEF" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:8.0.22.0:*:*:*:*:*:*:*", - "matchCriteriaId": "C0C5537E-3153-400D-9F9B-91E7F1218C8A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:8.0.24.0:*:*:*:*:*:*:*", - "matchCriteriaId": "32912721-F750-4C20-B999-E728F7D3A85D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:8.0.33.0:*:*:*:*:*:*:*", - "matchCriteriaId": "6693B1C4-B2A9-4725-AD0E-A266B9DF55AB" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:8.0.34.0:*:*:*:*:*:*:*", - "matchCriteriaId": "A95FA639-346C-491C-81A8-6C2A7B01AA19" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:8.0.35.0:*:*:*:*:*:*:*", - "matchCriteriaId": "C9F1E5AB-DEFA-42FC-A299-C8EEB778F9C6" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:8.0.39.0:*:*:*:*:*:*:*", - "matchCriteriaId": "FC7DD938-F963-4E03-B66B-F00436E4EA9D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:8.0.42.0:*:*:*:*:*:*:*", - "matchCriteriaId": "351825F4-227D-4743-A74B-EAFC1034500B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:9.0:*:*:*:*:*:*:*", - "matchCriteriaId": "B2A0777F-22C2-4FD5-BE81-8982BE6874D2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:9.0.8.0:*:*:*:*:*:*:*", - "matchCriteriaId": "AA8E58B1-D5B8-406F-BFD7-6244A1D2560E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:9.0.9.0:*:*:*:*:*:*:*", - "matchCriteriaId": "92B377AF-2108-4D02-8FF9-2AA6165A0579" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:9.0.16:*:*:*:*:*:*:*", - "matchCriteriaId": "F35F86B6-D49A-40F4-BFFA-5D6BBA2F7D8B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:9.0.18d60:*:*:*:*:*:*:*", - "matchCriteriaId": "600DDA9D-6440-48D1-8539-7127398A8678" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:9.0.20:*:*:*:*:*:*:*", - "matchCriteriaId": "B4D5E27C-F6BF-4F84-9B83-6AEC98B4AA14" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:9.0.20.0:*:*:*:*:*:*:*", - "matchCriteriaId": "934A869D-D58D-4C36-B86E-013F62790585" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:9.0.28:*:*:*:*:*:*:*", - "matchCriteriaId": "ACFA6611-99DA-48B0-89F7-DD99B8E30334" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:9.0.28.0:*:*:*:*:*:*:*", - "matchCriteriaId": "59AF804B-BD7A-4AD7-AD44-B5D980443B8B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:9.0.31:*:*:*:*:*:*:*", - "matchCriteriaId": "F5D52F86-2E38-4C66-9939-7603367B8D0E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:9.0.31.0:*:*:*:*:*:*:*", - "matchCriteriaId": "0557AA2A-FA3A-460A-8F03-DC74B149CA3D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:9.0.45.0:*:*:*:*:*:*:*", - "matchCriteriaId": "2FC04ABF-6191-4AA5-90B2-E7A97E6C6005" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:9.0.47.0:*:*:*:*:*:*:*", - "matchCriteriaId": "F22F1B02-CCF5-4770-A79B-1F58CA4321CE" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:9.0.48.0:*:*:*:*:*:*:*", - "matchCriteriaId": "93957171-F1F4-43ED-A8B9-2D36C81EB1F9" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:9.0.112.0:*:*:*:*:*:*:*", - "matchCriteriaId": "7AE89894-E492-4380-8A2B-4CDD3A15667A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:9.0.114.0:*:*:*:*:*:*:*", - "matchCriteriaId": "1C6ED706-BAF2-4795-B597-6F7EE8CA8911" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:9.0.115.0:*:*:*:*:*:*:*", - "matchCriteriaId": "260E2CF6-4D15-4168-A933-3EC52D8F93FF" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:9.0.124.0:*:*:*:*:*:*:*", - "matchCriteriaId": "D50BF190-2629-49A8-A377-4723C93FFB3E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:9.0.125.0:*:*:*:*:*:*:*", - "matchCriteriaId": "9E59E2AD-38BB-46DF-AC0D-D36F1F259AD4" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:9.0.151.0:*:*:*:*:*:*:*", - "matchCriteriaId": "DD04F04C-30CE-4A8D-B254-B10DEF62CEEE" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:9.0.152.0:*:*:*:*:*:*:*", - "matchCriteriaId": "96DC7742-499D-4BF5-9C5B-FCFF912A9892" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:9.0.155.0:*:*:*:*:*:*:*", - "matchCriteriaId": "BDD0A103-6D00-4D3D-9570-2DF74B6FE294" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:9.0.159.0:*:*:*:*:*:*:*", - "matchCriteriaId": "33AC4365-576C-487A-89C5-197A26D416C4" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:9.0.246.0:*:*:*:*:*:*:*", - "matchCriteriaId": "84B367AC-E1E1-4BC5-8BF4-D5B517C0CA7C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:9.0.260.0:*:*:*:*:*:*:*", - "matchCriteriaId": "A0A9C054-1F82-41DD-BE13-2B71B6F87F22" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:9.0.262.0:*:*:*:*:*:*:*", - "matchCriteriaId": "7CB0781E-D5B5-4576-ABD4-0EE1C0C3DF12" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:9.0.277.0:*:*:*:*:*:*:*", - "matchCriteriaId": "7AE15288-9344-41ED-B574-6DC4A4DDE386" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:9.0.280:*:*:*:*:*:*:*", - "matchCriteriaId": "EDC13ECD-4C49-48E3-A855-3DF8AAEACA74" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:9.0.283.0:*:*:*:*:*:*:*", - "matchCriteriaId": "84963C1D-06C1-4FBF-A3B8-EB14D2EB43DB" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:9.125.0:*:*:*:*:*:*:*", - "matchCriteriaId": "FE848097-01E6-4C9B-9593-282D55CC77D9" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:10:*:*:*:*:*:*:*", - "matchCriteriaId": "20349FB5-F30B-40EB-A5A0-219A935233B0" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:10.0.0.584:*:*:*:*:*:*:*", - "matchCriteriaId": "08E4028B-72E7-4E4A-AD0F-645F5AACAA29" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:10.0.2.54:*:*:*:*:*:*:*", - "matchCriteriaId": "86F5FDD3-A16E-4EE9-BDCD-49E206BE6BF1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:10.0.12.10:*:*:*:*:*:*:*", - "matchCriteriaId": "63313ADA-3C52-47C8-9745-6BF6AEF0F6AD" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:10.0.12.36:*:*:*:*:*:*:*", - "matchCriteriaId": "BA646396-7C10-45A0-89A9-C75C5D8AFB3E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:10.0.15.3:*:*:*:*:*:*:*", - "matchCriteriaId": "476BB487-150A-4482-8C84-E6A2995A97E1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:10.0.22.87:*:*:*:*:*:*:*", - "matchCriteriaId": "3555324F-40F8-4BF4-BE5F-52A1E22B3AFA" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:10.0.32.18:*:*:*:*:*:*:*", - "matchCriteriaId": "60540FDE-8C31-4679-A85E-614B1EFE1FF0" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:10.0.42.34:*:*:*:*:*:*:*", - "matchCriteriaId": "AE652520-B693-47F1-A342-621C149A7430" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:10.0.45.2:*:*:*:*:*:*:*", - "matchCriteriaId": "D0EC3272-8E1E-4415-A254-BB6C7FB49BEC" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:10.1:*:*:*:*:*:*:*", - "matchCriteriaId": "8E9A933E-5FBB-4E64-9166-7E56DE08E0D0" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:10.1.52.14:*:*:*:*:*:*:*", - "matchCriteriaId": "1CCE0A16-AA72-44B2-A2E5-567A1B37D8FD" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:10.1.52.14.1:*:*:*:*:*:*:*", - "matchCriteriaId": "0CF5AF16-A4F2-4E65-ADA8-DE11BE1F198D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:10.1.52.15:*:*:*:*:*:*:*", - "matchCriteriaId": "F7DF88E7-1A67-447C-BCF8-5C5564002207" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:10.1.53.64:*:*:*:*:*:*:*", - "matchCriteriaId": "460A0D6C-3A06-4910-B1E5-375E12F64F6E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:10.1.82.76:*:*:*:*:*:*:*", - "matchCriteriaId": "950D8316-8117-4C09-A2A9-B34191957D32" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:10.1.85.3:*:*:*:*:*:*:*", - "matchCriteriaId": "A5484DE8-3CB1-4591-BF30-0D5E255034E0" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:10.1.92.8:*:*:*:*:*:*:*", - "matchCriteriaId": "02EBACEB-1266-4A2C-A47E-066D12EE5B96" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:10.1.92.10:*:*:*:*:*:*:*", - "matchCriteriaId": "CA86C5B3-1FC9-4585-9566-862A0318AF2F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:10.1.95.1:*:*:*:*:*:*:*", - "matchCriteriaId": "CCC09395-A9C7-4D7F-9B55-3120A84CB427" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:10.1.95.2:*:*:*:*:*:*:*", - "matchCriteriaId": "3C2A6BBE-6033-4EF2-B890-9BD8867CC65A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:10.1.102.64:*:*:*:*:*:*:*", - "matchCriteriaId": "F3ACD1B2-F952-46C8-989A-C4744E16D5E6" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:10.1.105.6:*:*:*:*:*:*:*", - "matchCriteriaId": "33B7290A-8A7E-496D-95C4-DADA2821859B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:10.1.106.16:*:*:*:*:*:*:*", - "matchCriteriaId": "05D97485-2C56-4B63-B105-BDB44E853210" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:10.1.106.17:*:*:*:*:*:*:*", - "matchCriteriaId": "B665AEB6-7886-4C20-80F5-2688379E1C36" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:10.2.152:*:*:*:*:*:*:*", - "matchCriteriaId": "E91594E8-5320-4B6A-A4D8-17BBF211A96E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:10.2.152.26:*:*:*:*:*:*:*", - "matchCriteriaId": "D971B98A-2E97-4437-A7F1-3795E360565F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:10.2.152.32:*:*:*:*:*:*:*", - "matchCriteriaId": "110ED819-CFFD-4DA6-BE13-08CDEFD17ADF" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:10.2.152.33:*:*:*:*:*:*:*", - "matchCriteriaId": "C3FD4968-B784-40D5-A09C-51F303A4C8C4" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:10.2.153.1:*:*:*:*:*:*:*", - "matchCriteriaId": "A088CEA6-9871-4A4D-9139-EF241D0B9D4F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:10.2.154.13:*:*:*:*:*:*:*", - "matchCriteriaId": "D8314735-FF59-48CF-898B-95967B2856DB" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:10.2.154.25:*:*:*:*:*:*:*", - "matchCriteriaId": "3F52F734-0C14-4FE6-82C7-038C28383A12" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:10.2.156.12:*:*:*:*:*:*:*", - "matchCriteriaId": "8E007346-F45A-456F-BD0A-F3110A5854FD" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:10.2.157.51:*:*:*:*:*:*:*", - "matchCriteriaId": "4664A826-4DCA-4C73-B550-7C98D24C20A9" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:10.2.159.1:*:*:*:*:*:*:*", - "matchCriteriaId": "37C2722F-55D0-4390-BCE0-5FCB61549278" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.14:*:*:*:*:*:*:*", - "matchCriteriaId": "4011899D-C2A3-463F-9C1A-A3478CA467B5" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.16:*:*:*:*:*:*:*", - "matchCriteriaId": "330104CE-F418-4F6F-833E-725AF862BEB9" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.22:*:*:*:*:*:*:*", - "matchCriteriaId": "A148CC5B-60B5-4098-AE1C-75349E50D301" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.23:*:*:*:*:*:*:*", - "matchCriteriaId": "1C2E61C2-6640-43AC-B435-17DD1DD68C47" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.26:*:*:*:*:*:*:*", - "matchCriteriaId": "457D9876-959D-40A6-9B7A-6FA2C526F224" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.34:*:*:*:*:*:*:*", - "matchCriteriaId": "BA540D54-40C3-4C0B-9BF4-CB0B3FF22F60" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.5:*:*:*:*:*:*:*", - "matchCriteriaId": "3F86D2BF-E3D5-4F7B-931D-02C44AA9B61A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.7:*:*:*:*:*:*:*", - "matchCriteriaId": "78C73959-8BDF-45F1-B453-DEF20C75DC8E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.10:*:*:*:*:*:*:*", - "matchCriteriaId": "B7081373-1693-4412-8B35-B594DE7EED64" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.11:*:*:*:*:*:*:*", - "matchCriteriaId": "46ADCE2B-03B1-45A8-A6F0-88369C314473" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.15:*:*:*:*:*:*:*", - "matchCriteriaId": "9143B30C-28AD-4844-92C9-65445B4A2050" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.16:*:*:*:*:*:*:*", - "matchCriteriaId": "5CD017D9-3C1D-4E50-A0A4-DDC205ED0859" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.18:*:*:*:*:*:*:*", - "matchCriteriaId": "7C80FBFB-7562-4574-A0A9-33E0F5B46065" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.19:*:*:*:*:*:*:*", - "matchCriteriaId": "E60C0475-10A5-44DD-9E7B-CA17A5BAB5FB" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.23:*:*:*:*:*:*:*", - "matchCriteriaId": "7B67A163-6F07-43F3-8C2F-BEE69B0EBF12" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:10.3.185.22:*:*:*:*:*:*:*", - "matchCriteriaId": "DD5AA4A0-B4D0-4678-AB8E-3B8411D09D04" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:10.3.185.24:*:*:*:*:*:*:*", - "matchCriteriaId": "F410638D-9630-47E0-B892-FBD9277CE79A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:10.3.186.3:*:*:*:*:*:*:*", - "matchCriteriaId": "180CB536-2706-4A61-AB67-E590885905E7" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:10.3.186.6:*:*:*:*:*:*:*", - "matchCriteriaId": "E05AEB81-D9EE-42E5-A2DB-C791E9F82559" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:10.3.186.7:*:*:*:*:*:*:*", - "matchCriteriaId": "B6E39390-EB3C-47E9-B5C3-E012125498A8" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:11.0:*:*:*:*:*:*:*", - "matchCriteriaId": "3F0B0F1E-EFA6-40AA-9843-03DA0E257333" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:11.0.1.152:*:*:*:*:*:*:*", - "matchCriteriaId": "5DF4105C-162A-4523-8DE3-1CCF57F25F6A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:11.0.1.153:*:*:*:*:*:*:*", - "matchCriteriaId": "E132DC80-DE83-43B1-930E-7BA0E823BBD0" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:11.1:*:*:*:*:*:*:*", - "matchCriteriaId": "4D7004E6-9992-4ED4-8EDC-7443260A7488" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.55:*:*:*:*:*:*:*", - "matchCriteriaId": "D05546BB-7EE7-4202-8A55-D413C1BE6D9D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.59:*:*:*:*:*:*:*", - "matchCriteriaId": "D7E37677-1180-4EA7-AF8E-8F22178F6D30" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.62:*:*:*:*:*:*:*", - "matchCriteriaId": "855B89AA-87DA-415F-8D63-E2DBC9C28FC0" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.63:*:*:*:*:*:*:*", - "matchCriteriaId": "7E04E602-4ABA-49C8-89BB-682F62A99A1C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:11.1.111.8:*:*:*:*:*:*:*", - "matchCriteriaId": "AA3726C7-275A-4B91-874F-224C1AB2DF2E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:11.1.115.7:*:*:*:*:*:*:*", - "matchCriteriaId": "1F340330-880B-4F92-B8C3-8CF8E8178075" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.228:*:*:*:*:*:*:*", - "matchCriteriaId": "5AFBB9EA-1A66-4FBC-BF89-7DF04FDD6788" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.233:*:*:*:*:*:*:*", - "matchCriteriaId": "39065E60-3680-4384-95C0-EF4F874D2400" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.235:*:*:*:*:*:*:*", - "matchCriteriaId": "2B0603B3-5C98-422D-A49D-EBE1798DAE69" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.238:*:*:*:*:*:*:*", - "matchCriteriaId": "CED86796-B721-49B1-A021-82FA769FA024" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.270:*:*:*:*:*:*:*", - "matchCriteriaId": "67262486-1D8D-4884-B113-E3034DEC70B6" + "versionEndExcluding": "11.4.402.265", + "matchCriteriaId": "BC1BDA0B-A704-4D28-A18C-2EE71896FC7A" } ] } @@ -755,23 +103,32 @@ "url": "http://packetstormsecurity.org/files/116435/Adobe-Flash-Player-Matrix3D-Integer-Overflow-Code-Execution.html", "source": "psirt@adobe.com", "tags": [ - "Exploit" + "Exploit", + "Third Party Advisory" ] }, { "url": "http://www.adobe.com/support/security/bulletins/apsb12-19.html", "source": "psirt@adobe.com", "tags": [ + "Not Applicable", "Vendor Advisory" ] }, { "url": "http://www.vupen.com/english/services/ba-index.php", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78866", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2013/CVE-2013-13xx/CVE-2013-1331.json b/CVE-2013/CVE-2013-13xx/CVE-2013-1331.json index 663051ee1e5..083c6dfe61a 100644 --- a/CVE-2013/CVE-2013-13xx/CVE-2013-1331.json +++ b/CVE-2013/CVE-2013-13xx/CVE-2013-1331.json @@ -2,8 +2,9 @@ "id": "CVE-2013-1331", "sourceIdentifier": "secure@microsoft.com", "published": "2013-06-12T03:29:57.117", - "lastModified": "2018-10-12T22:04:17.583", - "vulnStatus": "Modified", + "lastModified": "2024-06-28T14:18:56.450", + "vulnStatus": "Analyzed", + "cveTags": [], "cisaExploitAdd": "2022-06-08", "cisaActionDue": "2022-06-22", "cisaRequiredAction": "Apply updates per vendor instructions.", @@ -19,6 +20,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -52,7 +75,7 @@ "description": [ { "lang": "en", - "value": "CWE-119" + "value": "CWE-120" } ] } @@ -71,8 +94,8 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:office:2011:*:mac:*:*:*:*:*", - "matchCriteriaId": "0D84FC39-29AA-4EF2-ACE7-E72635126F2B" + "criteria": "cpe:2.3:a:microsoft:office:2011:*:*:*:*:macos:*:*", + "matchCriteriaId": "BCB90D64-B7B2-4301-91E3-A113569371F2" } ] } @@ -84,20 +107,31 @@ "url": "http://www.us-cert.gov/ncas/alerts/TA13-168A", "source": "secure@microsoft.com", "tags": [ + "Third Party Advisory", "US Government Resource" ] }, { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-051", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] }, { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16713", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16732", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Broken Link" + ] } ] } \ No newline at end of file diff --git a/CVE-2013/CVE-2013-25xx/CVE-2013-2596.json b/CVE-2013/CVE-2013-25xx/CVE-2013-2596.json index 27311c52e00..8a8b48c83fc 100644 --- a/CVE-2013/CVE-2013-25xx/CVE-2013-2596.json +++ b/CVE-2013/CVE-2013-25xx/CVE-2013-2596.json @@ -2,8 +2,9 @@ "id": "CVE-2013-2596", "sourceIdentifier": "cve@mitre.org", "published": "2013-04-13T02:59:46.627", - "lastModified": "2023-11-07T02:15:04.780", - "vulnStatus": "Modified", + "lastModified": "2024-06-28T14:01:45.387", + "vulnStatus": "Analyzed", + "cveTags": [], "cisaExploitAdd": "2022-09-15", "cisaActionDue": "2022-10-06", "cisaRequiredAction": "Apply updates per vendor instructions.", @@ -19,6 +20,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -52,7 +75,7 @@ "description": [ { "lang": "en", - "value": "CWE-189" + "value": "CWE-190" } ] } @@ -134,17 +157,22 @@ "url": "http://forum.xda-developers.com/showthread.php?t=2255491", "source": "cve@mitre.org", "tags": [ - "Exploit", - "Third Party Advisory" + "Exploit" ] }, { "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=b4cbb197c7e7a68dbad0d491242e3ca67420c13e", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=fc9bbca8f650e5f738af8806317c0a041a48ae4a", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10761", @@ -188,6 +216,7 @@ "source": "cve@mitre.org", "tags": [ "Exploit", + "Issue Tracking", "Third Party Advisory" ] }, @@ -196,14 +225,15 @@ "source": "cve@mitre.org", "tags": [ "Exploit", - "Third Party Advisory" + "Issue Tracking" ] }, { "url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.8.9", "source": "cve@mitre.org", "tags": [ - "Vendor Advisory" + "Mailing List", + "Release Notes" ] }, { @@ -217,6 +247,7 @@ "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html", "source": "cve@mitre.org", "tags": [ + "Patch", "Third Party Advisory" ] }, @@ -224,6 +255,7 @@ "url": "http://www.securityfocus.com/bid/59264", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Third Party Advisory", "VDB Entry" ] @@ -232,8 +264,7 @@ "url": "https://github.com/torvalds/linux/commit/b4cbb197c7e7a68dbad0d491242e3ca67420c13e", "source": "cve@mitre.org", "tags": [ - "Patch", - "Third Party Advisory" + "Patch" ] }, { @@ -241,8 +272,7 @@ "source": "cve@mitre.org", "tags": [ "Exploit", - "Patch", - "Third Party Advisory" + "Patch" ] } ] diff --git a/CVE-2013/CVE-2013-31xx/CVE-2013-3163.json b/CVE-2013/CVE-2013-31xx/CVE-2013-3163.json index 62ddad42f51..29a797aca12 100644 --- a/CVE-2013/CVE-2013-31xx/CVE-2013-3163.json +++ b/CVE-2013/CVE-2013-31xx/CVE-2013-3163.json @@ -2,8 +2,9 @@ "id": "CVE-2013-3163", "sourceIdentifier": "secure@microsoft.com", "published": "2013-07-10T03:46:10.527", - "lastModified": "2018-10-12T22:04:42.053", - "vulnStatus": "Modified", + "lastModified": "2024-06-28T13:40:22.220", + "vulnStatus": "Analyzed", + "cveTags": [], "cisaExploitAdd": "2023-03-30", "cisaActionDue": "2023-04-20", "cisaRequiredAction": "The impacted product is end-of-life and should be disconnected if still in use.", @@ -19,6 +20,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -52,13 +75,14 @@ "description": [ { "lang": "en", - "value": "CWE-94" + "value": "CWE-787" } ] } ], "configurations": [ { + "operator": "AND", "nodes": [ { "operator": "OR", @@ -68,18 +92,143 @@ "vulnerable": true, "criteria": "cpe:2.3:a:microsoft:internet_explorer:8:*:*:*:*:*:*:*", "matchCriteriaId": "A52E757F-9B41-43B4-9D67-3FEDACA71283" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*", + "matchCriteriaId": "C2B1C231-DE19-4B8F-A4AA-5B3A65276E46" }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:x64:*", + "matchCriteriaId": "A7371547-290D-4D0D-B98D-CA28B4D2E8B0" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*", + "matchCriteriaId": "2127D10C-B6F3-4C1D-B9AA-5D78513CC996" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*", + "matchCriteriaId": "B320A104-9037-487E-BC9A-62B4A6B49FD0" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", + "matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:-:*:x64:*", + "matchCriteriaId": "08627673-D381-4481-BD04-F56599C43105" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:professional:*:x64:*", + "matchCriteriaId": "C6109348-BC79-4ED3-8D41-EA546A540C79" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:*:*:*:*", + "matchCriteriaId": "C9392D35-7BF5-48E9-879B-BBDE9A9E9AB9" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:*", "matchCriteriaId": "C043EDDD-41BF-4718-BDCF-158BBBDB6360" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*", + "matchCriteriaId": "C2B1C231-DE19-4B8F-A4AA-5B3A65276E46" }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", + "matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", + "matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:-:*:x64:*", + "matchCriteriaId": "08627673-D381-4481-BD04-F56599C43105" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:microsoft:internet_explorer:10:*:*:*:*:*:*:*", "matchCriteriaId": "D5808661-A082-4CBE-808C-B253972487B4" } ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*", + "matchCriteriaId": "C2B1C231-DE19-4B8F-A4AA-5B3A65276E46" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_8:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0D229E41-A971-4284-9657-16D78414B93F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_rt:-:*:*:*:*:*:*:*", + "matchCriteriaId": "ABC7A32C-4A4A-4533-B42E-350E728ADFEB" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", + "matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074" + } + ] } ] } @@ -95,11 +244,18 @@ }, { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-055", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] }, { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17363", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Broken Link" + ] } ] } \ No newline at end of file diff --git a/CVE-2016/CVE-2016-16xx/CVE-2016-1646.json b/CVE-2016/CVE-2016-16xx/CVE-2016-1646.json index 04d26dfed53..92dd36fc573 100644 --- a/CVE-2016/CVE-2016-16xx/CVE-2016-1646.json +++ b/CVE-2016/CVE-2016-16xx/CVE-2016-1646.json @@ -2,8 +2,9 @@ "id": "CVE-2016-1646", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2016-03-29T10:59:00.160", - "lastModified": "2023-11-07T02:30:20.167", - "vulnStatus": "Modified", + "lastModified": "2024-06-28T14:19:18.833", + "vulnStatus": "Analyzed", + "cveTags": [], "cisaExploitAdd": "2022-06-08", "cisaActionDue": "2022-06-22", "cisaRequiredAction": "Apply updates per vendor instructions.", @@ -19,13 +20,13 @@ } ], "metrics": { - "cvssMetricV30": [ + "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -74,7 +75,7 @@ "description": [ { "lang": "en", - "value": "CWE-119" + "value": "CWE-125" } ] } @@ -90,6 +91,11 @@ "vulnerable": true, "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", + "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252" } ] } @@ -103,8 +109,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", - "matchCriteriaId": "B5A6F2F3-4894-4392-8296-3B8DD2679084" + "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*", + "matchCriteriaId": "815D70A8-47D3-459C-A32C-9FEACA0659D1" }, { "vulnerable": true, @@ -113,8 +119,44 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", - "matchCriteriaId": "F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B" + "criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*", + "matchCriteriaId": "7A5301BF-1402-4BE0-A0F8-69FBE79BC6D6" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", + "versionEndExcluding": "49.0.2623.108", + "matchCriteriaId": "8D0E4F36-3A08-4A84-A0ED-C8BF1CD72EDD" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:suse:package_hub:-:*:*:*:*:*:*:*", + "matchCriteriaId": "284A8DA0-317B-4BBE-AECB-7E91BBF0DD3B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*", + "matchCriteriaId": "4863BE36-D16A-4D75-90D9-FD76DB5B48B7" }, { "vulnerable": true, @@ -133,9 +175,23 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", - "versionEndIncluding": "49.0.2623.95", - "matchCriteriaId": "4E359098-BF8A-4A56-A152-DA06F18096B2" + "criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", + "matchCriteriaId": "EE249E1B-A1FD-4E08-AA71-A0E1F10FFE97" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:6.7:*:*:*:*:*:*:*", + "matchCriteriaId": "967EC28A-607F-48F4-AD64-5E3041C768F0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", + "matchCriteriaId": "9BBCD86A-E6C7-4444-9D74-F861084090F0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", + "matchCriteriaId": "E5ED5807-55B7-47C5-97A6-03233F4FBC3A" } ] } @@ -145,47 +201,89 @@ "references": [ { "url": "http://googlechromereleases.blogspot.com/2016/03/stable-channel-update_24.html", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00000.html", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00001.html", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00039.html", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://rhn.redhat.com/errata/RHSA-2016-0525.html", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://www.debian.org/security/2016/dsa-3531", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://www.securitytracker.com/id/1035423", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.ubuntu.com/usn/USN-2955-1", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://code.google.com/p/chromium/issues/detail?id=594574", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Exploit", + "Issue Tracking", + "Mailing List" + ] }, { "url": "https://codereview.chromium.org/1804963002/", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Patch" + ] }, { "url": "https://security.gentoo.org/glsa/201605-02", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2016/CVE-2016-200xx/CVE-2016-20022.json b/CVE-2016/CVE-2016-200xx/CVE-2016-20022.json index 3d566f99629..2bf9354aa39 100644 --- a/CVE-2016/CVE-2016-200xx/CVE-2016-20022.json +++ b/CVE-2016/CVE-2016-200xx/CVE-2016-20022.json @@ -2,8 +2,16 @@ "id": "CVE-2016-20022", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-27T23:15:50.127", - "lastModified": "2024-06-27T23:15:50.127", - "vulnStatus": "Received", + "lastModified": "2024-06-28T10:27:00.920", + "vulnStatus": "Awaiting Analysis", + "cveTags": [ + { + "sourceIdentifier": "cve@mitre.org", + "tags": [ + "unsupported-when-assigned" + ] + } + ], "descriptions": [ { "lang": "en", diff --git a/CVE-2016/CVE-2016-51xx/CVE-2016-5198.json b/CVE-2016/CVE-2016-51xx/CVE-2016-5198.json index 32429967c81..e9693b7ff5f 100644 --- a/CVE-2016/CVE-2016-51xx/CVE-2016-5198.json +++ b/CVE-2016/CVE-2016-51xx/CVE-2016-5198.json @@ -2,8 +2,9 @@ "id": "CVE-2016-5198", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2017-01-19T05:59:00.213", - "lastModified": "2023-11-07T02:33:25.190", - "vulnStatus": "Modified", + "lastModified": "2024-06-28T14:19:29.210", + "vulnStatus": "Analyzed", + "cveTags": [], "cisaExploitAdd": "2022-06-08", "cisaActionDue": "2022-06-22", "cisaRequiredAction": "Apply updates per vendor instructions.", @@ -19,13 +20,13 @@ } ], "metrics": { - "cvssMetricV30": [ + "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -85,6 +86,7 @@ ], "configurations": [ { + "operator": "AND", "nodes": [ { "operator": "OR", @@ -93,8 +95,105 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", - "versionEndIncluding": "54.0.2840.71", - "matchCriteriaId": "C57D8615-7A4E-4084-8209-14CD1FC3802F" + "versionEndExcluding": "54.0.2840.90", + "matchCriteriaId": "0F6BFD35-9594-4949-AD5A-0661B96F4C81" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", + "matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", + "versionEndExcluding": "54.0.2840.85", + "matchCriteriaId": "C961C8B2-71BA-4513-8501-28606C08771D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F8B9FEC8-73B6-43B8-B24E-1F7C20D91D26" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", + "versionEndExcluding": "54.0.2840.87", + "matchCriteriaId": "74A810B0-5515-40B8-AACD-D8104E92BFBC" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", + "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", + "matchCriteriaId": "EE249E1B-A1FD-4E08-AA71-A0E1F10FFE97" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", + "matchCriteriaId": "9BBCD86A-E6C7-4444-9D74-F861084090F0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", + "matchCriteriaId": "E5ED5807-55B7-47C5-97A6-03233F4FBC3A" } ] } @@ -104,23 +203,44 @@ "references": [ { "url": "http://rhn.redhat.com/errata/RHSA-2016-2672.html", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://www.securityfocus.com/bid/94079", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.securitytracker.com/id/1037224", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://chromereleases.googleblog.com/2016/11/stable-channel-update-for-desktop.html", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://crbug.com/659475", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Exploit", + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2017/CVE-2017-113xx/CVE-2017-11357.json b/CVE-2017/CVE-2017-113xx/CVE-2017-11357.json index b6f5f42637f..82ab074266c 100644 --- a/CVE-2017/CVE-2017-113xx/CVE-2017-11357.json +++ b/CVE-2017/CVE-2017-113xx/CVE-2017-11357.json @@ -2,8 +2,9 @@ "id": "CVE-2017-11357", "sourceIdentifier": "cve@mitre.org", "published": "2017-08-23T17:29:00.227", - "lastModified": "2018-01-28T02:29:00.347", - "vulnStatus": "Modified", + "lastModified": "2024-06-28T13:44:56.063", + "vulnStatus": "Analyzed", + "cveTags": [], "cisaExploitAdd": "2023-01-26", "cisaActionDue": "2023-02-16", "cisaRequiredAction": "Apply updates per vendor instructions.", @@ -19,13 +20,13 @@ } ], "metrics": { - "cvssMetricV30": [ + "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -74,7 +75,7 @@ "description": [ { "lang": "en", - "value": "CWE-20" + "value": "CWE-434" } ] } @@ -89,8 +90,8 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:telerik:ui_for_asp.net_ajax:*:*:*:*:*:*:*:*", - "versionEndIncluding": "2017.2.621", - "matchCriteriaId": "F80128E1-2A3A-4FA3-BD44-F42A09F0A0F3" + "versionEndExcluding": "2020.1.114", + "matchCriteriaId": "E98B8E56-660F-4AD3-90B0-F799B2257F95" } ] } @@ -108,7 +109,12 @@ }, { "url": "https://www.exploit-db.com/exploits/43874/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2017/CVE-2017-159xx/CVE-2017-15944.json b/CVE-2017/CVE-2017-159xx/CVE-2017-15944.json index 7ef9b7cc852..3204d39f9e2 100644 --- a/CVE-2017/CVE-2017-159xx/CVE-2017-15944.json +++ b/CVE-2017/CVE-2017-159xx/CVE-2017-15944.json @@ -2,8 +2,9 @@ "id": "CVE-2017-15944", "sourceIdentifier": "cve@mitre.org", "published": "2017-12-11T17:29:00.490", - "lastModified": "2020-02-17T16:15:20.490", - "vulnStatus": "Modified", + "lastModified": "2024-06-28T14:08:41.457", + "vulnStatus": "Analyzed", + "cveTags": [], "cisaExploitAdd": "2022-08-18", "cisaActionDue": "2022-09-08", "cisaRequiredAction": "Apply updates per vendor instructions.", @@ -19,13 +20,13 @@ } ], "metrics": { - "cvssMetricV30": [ + "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -123,6 +124,7 @@ "url": "http://www.securityfocus.com/bid/102079", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Third Party Advisory", "VDB Entry" ] @@ -131,18 +133,23 @@ "url": "http://www.securitytracker.com/id/1040007", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Third Party Advisory", "VDB Entry" ] }, { "url": "https://security.paloaltonetworks.com/CVE-2017-15944", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.exploit-db.com/exploits/43342/", "source": "cve@mitre.org", "tags": [ + "Exploit", "Third Party Advisory", "VDB Entry" ] diff --git a/CVE-2017/CVE-2017-50xx/CVE-2017-5030.json b/CVE-2017/CVE-2017-50xx/CVE-2017-5030.json index f53043e3a0b..5b537b7215e 100644 --- a/CVE-2017/CVE-2017-50xx/CVE-2017-5030.json +++ b/CVE-2017/CVE-2017-50xx/CVE-2017-5030.json @@ -2,8 +2,9 @@ "id": "CVE-2017-5030", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2017-04-24T23:59:00.190", - "lastModified": "2023-11-07T02:48:35.810", - "vulnStatus": "Modified", + "lastModified": "2024-06-28T14:19:48.733", + "vulnStatus": "Analyzed", + "cveTags": [], "cisaExploitAdd": "2022-06-08", "cisaActionDue": "2022-06-22", "cisaRequiredAction": "Apply updates per vendor instructions.", @@ -90,8 +91,8 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", - "versionEndIncluding": "57.0.2987.75", - "matchCriteriaId": "2B9559EF-FA8D-4452-BD04-243F0BD5389D" + "versionEndExcluding": "57.0.2987.98", + "matchCriteriaId": "26404A89-BDA8-427F-8BCC-27EC3835FC7B" } ] }, @@ -128,8 +129,8 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", - "versionEndIncluding": "57.0.2987.100", - "matchCriteriaId": "78D4802A-D418-48B0-AB99-B9F28C66F6C4" + "versionEndExcluding": "57.0.2987.108", + "matchCriteriaId": "A9D345E8-DAFB-4366-B68F-311C3B39AAF6" } ] }, @@ -195,31 +196,58 @@ "references": [ { "url": "http://rhn.redhat.com/errata/RHSA-2017-0499.html", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://www.debian.org/security/2017/dsa-3810", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://www.securityfocus.com/bid/96767", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://chromereleases.googleblog.com/2017/03/stable-channel-update-for-desktop.html", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://crbug.com/682194", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Exploit", + "Issue Tracking" + ] }, { "url": "https://security.gentoo.org/glsa/201704-02", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-126/", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2017/CVE-2017-50xx/CVE-2017-5070.json b/CVE-2017/CVE-2017-50xx/CVE-2017-5070.json index 52f50dd40e7..d6ac78f0aa9 100644 --- a/CVE-2017/CVE-2017-50xx/CVE-2017-5070.json +++ b/CVE-2017/CVE-2017-50xx/CVE-2017-5070.json @@ -2,8 +2,9 @@ "id": "CVE-2017-5070", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2017-10-27T05:29:00.847", - "lastModified": "2023-11-07T02:48:53.853", - "vulnStatus": "Modified", + "lastModified": "2024-06-28T14:19:57.837", + "vulnStatus": "Analyzed", + "cveTags": [], "cisaExploitAdd": "2022-06-08", "cisaActionDue": "2022-06-22", "cisaRequiredAction": "Apply updates per vendor instructions.", @@ -175,27 +176,51 @@ "references": [ { "url": "http://www.securityfocus.com/bid/98861", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.securitytracker.com/id/1038622", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://access.redhat.com/errata/RHSA-2017:1399", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://chromereleases.googleblog.com/2017/06/stable-channel-update-for-desktop.html", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://crbug.com/722756", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Exploit", + "Issue Tracking" + ] }, { "url": "https://security.gentoo.org/glsa/201706-20", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2017/CVE-2017-55xx/CVE-2017-5521.json b/CVE-2017/CVE-2017-55xx/CVE-2017-5521.json index c762264865f..a0bb193263d 100644 --- a/CVE-2017/CVE-2017-55xx/CVE-2017-5521.json +++ b/CVE-2017/CVE-2017-55xx/CVE-2017-5521.json @@ -2,8 +2,9 @@ "id": "CVE-2017-5521", "sourceIdentifier": "cve@mitre.org", "published": "2017-01-17T09:59:00.333", - "lastModified": "2017-09-01T01:29:35.680", - "vulnStatus": "Modified", + "lastModified": "2024-06-28T14:02:32.663", + "vulnStatus": "Analyzed", + "cveTags": [], "cisaExploitAdd": "2022-09-08", "cisaActionDue": "2022-09-29", "cisaRequiredAction": "Apply updates per vendor instructions. If the affected device has since entered end-of-life, it should be disconnected if still in use.", @@ -19,13 +20,13 @@ } ], "metrics": { - "cvssMetricV30": [ + "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "HIGH", "privilegesRequired": "NONE", @@ -74,7 +75,7 @@ "description": [ { "lang": "en", - "value": "CWE-200" + "value": "NVD-CWE-noinfo" } ] } @@ -115,9 +116,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:netgear:r6300:-:*:*:*:*:*:*:*", - "matchCriteriaId": "9597966A-B13C-4098-838B-EC9AA8DE443D" + "vulnerable": true, + "criteria": "cpe:2.3:o:netgear:r6300_firmware:1.0.2.78_1.0.58:*:*:*:*:*:*:*", + "matchCriteriaId": "89A99D1C-CABE-4526-B3B7-3708C0E18AC4" } ] }, @@ -126,9 +127,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:netgear:r6300_firmware:1.0.2.78_1.0.58:*:*:*:*:*:*:*", - "matchCriteriaId": "89A99D1C-CABE-4526-B3B7-3708C0E18AC4" + "vulnerable": false, + "criteria": "cpe:2.3:h:netgear:r6300:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9597966A-B13C-4098-838B-EC9AA8DE443D" } ] } @@ -137,17 +138,6 @@ { "operator": "AND", "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": false, - "criteria": "cpe:2.3:h:netgear:vegn2610:-:*:*:*:*:*:*:*", - "matchCriteriaId": "0967FC76-F977-4D18-B570-9444459A19FE" - } - ] - }, { "operator": "OR", "negate": false, @@ -158,23 +148,23 @@ "matchCriteriaId": "6D329D85-C180-426E-B430-9FEDE5C77F25" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": false, - "criteria": "cpe:2.3:h:netgear:ac1450:-:*:*:*:*:*:*:*", - "matchCriteriaId": "E4BA18B2-8234-4C26-B865-741D467C5EBE" + "criteria": "cpe:2.3:h:netgear:vegn2610:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0967FC76-F977-4D18-B570-9444459A19FE" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -185,23 +175,23 @@ "matchCriteriaId": "91292776-92F7-4089-86FC-7569C8F940DE" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": false, - "criteria": "cpe:2.3:h:netgear:wnr1000v3:-:*:*:*:*:*:*:*", - "matchCriteriaId": "252E5C7B-EF02-4374-A43E-02FAA9E697D0" + "criteria": "cpe:2.3:h:netgear:ac1450:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E4BA18B2-8234-4C26-B865-741D467C5EBE" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -212,23 +202,23 @@ "matchCriteriaId": "4E35A89F-44C7-496C-B61B-652989EDE438" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": false, - "criteria": "cpe:2.3:h:netgear:wndr3700v3:-:*:*:*:*:*:*:*", - "matchCriteriaId": "603836E6-E7FF-43C7-A410-8BD9D0950F7C" + "criteria": "cpe:2.3:h:netgear:wnr1000v3:-:*:*:*:*:*:*:*", + "matchCriteriaId": "252E5C7B-EF02-4374-A43E-02FAA9E697D0" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -239,23 +229,23 @@ "matchCriteriaId": "1D59A6F9-0359-4AB4-AD0F-1D6044D59409" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": false, - "criteria": "cpe:2.3:h:netgear:wndr4000:-:*:*:*:*:*:*:*", - "matchCriteriaId": "1C34EC74-D6F1-46F1-B47E-E62793171427" + "criteria": "cpe:2.3:h:netgear:wndr3700v3:-:*:*:*:*:*:*:*", + "matchCriteriaId": "603836E6-E7FF-43C7-A410-8BD9D0950F7C" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -266,23 +256,23 @@ "matchCriteriaId": "91561A20-30F5-4163-9178-5FC32897F827" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": false, - "criteria": "cpe:2.3:h:netgear:wndr4500:-:*:*:*:*:*:*:*", - "matchCriteriaId": "7E9F459C-B628-402A-AF4A-72E08FE41837" + "criteria": "cpe:2.3:h:netgear:wndr4000:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1C34EC74-D6F1-46F1-B47E-E62793171427" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -293,6 +283,17 @@ "matchCriteriaId": "B9874914-4D90-493F-BD2B-40FFF1737F58" } ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:netgear:wndr4500:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7E9F459C-B628-402A-AF4A-72E08FE41837" + } + ] } ] }, @@ -304,9 +305,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:netgear:d6400:-:*:*:*:*:*:*:*", - "matchCriteriaId": "7D30939B-86E3-4C78-9B05-686B4994C8B9" + "vulnerable": true, + "criteria": "cpe:2.3:o:netgear:d6400_firmware:1.0.0.44:*:*:*:*:*:*:*", + "matchCriteriaId": "D3EB5F49-3628-4418-AF36-AF8FD6F5BA25" } ] }, @@ -315,9 +316,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:netgear:d6400_firmware:1.0.0.44:*:*:*:*:*:*:*", - "matchCriteriaId": "D3EB5F49-3628-4418-AF36-AF8FD6F5BA25" + "vulnerable": false, + "criteria": "cpe:2.3:h:netgear:d6400:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7D30939B-86E3-4C78-9B05-686B4994C8B9" } ] } @@ -444,13 +445,19 @@ "url": "http://www.securityfocus.com/bid/95457", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Third Party Advisory", "VDB Entry" ] }, { "url": "https://www.exploit-db.com/exploits/41205/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2017/CVE-2017-68xx/CVE-2017-6862.json b/CVE-2017/CVE-2017-68xx/CVE-2017-6862.json index 3b09af090bd..670090f33b9 100644 --- a/CVE-2017/CVE-2017-68xx/CVE-2017-6862.json +++ b/CVE-2017/CVE-2017-68xx/CVE-2017-6862.json @@ -2,8 +2,9 @@ "id": "CVE-2017-6862", "sourceIdentifier": "a2826606-91e7-4eb6-899e-8484bd4575d5", "published": "2017-05-26T20:29:00.177", - "lastModified": "2023-11-07T02:49:58.757", - "vulnStatus": "Modified", + "lastModified": "2024-06-28T14:21:28.377", + "vulnStatus": "Analyzed", + "cveTags": [], "cisaExploitAdd": "2022-06-08", "cisaActionDue": "2022-06-22", "cisaRequiredAction": "Apply updates per vendor instructions.", @@ -19,13 +20,13 @@ } ], "metrics": { - "cvssMetricV30": [ + "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -74,7 +75,7 @@ "description": [ { "lang": "en", - "value": "CWE-119" + "value": "CWE-120" } ] } @@ -90,8 +91,8 @@ { "vulnerable": true, "criteria": "cpe:2.3:o:netgear:wnr2000v5_firmware:*:*:*:*:*:*:*:*", - "versionEndIncluding": "1.0.0.41", - "matchCriteriaId": "8D43B777-98E2-4E70-8309-A92AC10FA235" + "versionEndExcluding": "1.0.0.42", + "matchCriteriaId": "9E2C503D-A603-4C93-9125-E72CE6D98219" } ] }, @@ -118,8 +119,8 @@ { "vulnerable": true, "criteria": "cpe:2.3:o:netgear:wnr2000v4_firmware:*:*:*:*:*:*:*:*", - "versionEndIncluding": "1.0.0.65", - "matchCriteriaId": "B92AFAAE-EC97-4213-A2C9-6A6A5FC8F84B" + "versionEndExcluding": "1.0.0.66", + "matchCriteriaId": "598F1EB8-757F-4E3B-B1FD-C50C94B1632B" } ] }, @@ -146,8 +147,8 @@ { "vulnerable": true, "criteria": "cpe:2.3:o:netgear:wnr2000v3_firmware:*:*:*:*:*:*:*:*", - "versionEndIncluding": "1.1.2.13", - "matchCriteriaId": "5E6AE2D6-B971-4F66-8C1F-1E9EE53FF9B7" + "versionEndExcluding": "1.1.2.14", + "matchCriteriaId": "61B034B2-3B15-4C7B-A47E-04DDF36992AF" } ] }, @@ -168,15 +169,26 @@ "references": [ { "url": "http://www.securityfocus.com/bid/98740", - "source": "a2826606-91e7-4eb6-899e-8484bd4575d5" + "source": "a2826606-91e7-4eb6-899e-8484bd4575d5", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://kb.netgear.com/000038542/Security-Advisory-for-Unauthenticated-Remote-Code-Execution-on-Some-Routers-PSV-2016-0261", - "source": "a2826606-91e7-4eb6-899e-8484bd4575d5" + "source": "a2826606-91e7-4eb6-899e-8484bd4575d5", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.on-x.com/sites/default/files/on-x_-_security_advisory_-_netgear_wnr2000v5_-_cve-2017-6862.pdf", - "source": "a2826606-91e7-4eb6-899e-8484bd4575d5" + "source": "a2826606-91e7-4eb6-899e-8484bd4575d5", + "tags": [ + "Broken Link" + ] } ] } \ No newline at end of file diff --git a/CVE-2018/CVE-2018-133xx/CVE-2018-13374.json b/CVE-2018/CVE-2018-133xx/CVE-2018-13374.json index 2158aa6fa2e..a897f4960e2 100644 --- a/CVE-2018/CVE-2018-133xx/CVE-2018-13374.json +++ b/CVE-2018/CVE-2018-133xx/CVE-2018-13374.json @@ -2,8 +2,9 @@ "id": "CVE-2018-13374", "sourceIdentifier": "psirt@fortinet.com", "published": "2019-01-22T14:29:00.220", - "lastModified": "2021-06-03T11:15:07.707", - "vulnStatus": "Modified", + "lastModified": "2024-06-28T14:04:14.410", + "vulnStatus": "Analyzed", + "cveTags": [], "cisaExploitAdd": "2022-09-08", "cisaActionDue": "2022-09-29", "cisaRequiredAction": "Apply updates per vendor instructions.", @@ -20,6 +21,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + }, { "source": "psirt@fortinet.com", "type": "Secondary", @@ -86,6 +107,28 @@ "operator": "OR", "negate": false, "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortiadc:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.4.0", + "versionEndIncluding": "5.4.4", + "matchCriteriaId": "6FC8E0FE-206C-4F0B-AFEF-79DC499D8CE4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortiadc:6.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "93A2FC20-277C-4DB0-A5FD-50364581B3EB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortiadc:6.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "40AD7E74-E285-46A5-B4BB-06196F99C19B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortiadc:6.1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "028E15CD-B5F9-4376-9758-78D131103BF1" + }, { "vulnerable": true, "criteria": "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*", diff --git a/CVE-2018/CVE-2018-174xx/CVE-2018-17463.json b/CVE-2018/CVE-2018-174xx/CVE-2018-17463.json index f740001af7c..9537d886537 100644 --- a/CVE-2018/CVE-2018-174xx/CVE-2018-17463.json +++ b/CVE-2018/CVE-2018-174xx/CVE-2018-17463.json @@ -2,8 +2,9 @@ "id": "CVE-2018-17463", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2018-11-14T15:29:00.297", - "lastModified": "2020-08-24T17:37:01.140", - "vulnStatus": "Modified", + "lastModified": "2024-06-28T14:21:46.070", + "vulnStatus": "Analyzed", + "cveTags": [], "cisaExploitAdd": "2022-06-08", "cisaActionDue": "2022-06-22", "cisaRequiredAction": "Apply updates per vendor instructions.", @@ -19,13 +20,13 @@ } ], "metrics": { - "cvssMetricV30": [ + "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -104,18 +105,18 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:redhat:linux_desktop:6.0:*:*:*:*:*:*:*", - "matchCriteriaId": "84596649-9CB0-44A7-A8EF-177E0D1640ED" + "criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", + "matchCriteriaId": "EE249E1B-A1FD-4E08-AA71-A0E1F10FFE97" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:redhat:linux_server:6.0:*:*:*:*:*:*:*", - "matchCriteriaId": "B985AFE9-69D3-4BF8-8BCB-18BFC5863BA1" + "criteria": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", + "matchCriteriaId": "9BBCD86A-E6C7-4444-9D74-F861084090F0" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:redhat:linux_workstation:6.0:*:*:*:*:*:*:*", - "matchCriteriaId": "EFEB3E58-B8D9-4A3E-8A11-215B4E7770B2" + "criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", + "matchCriteriaId": "E5ED5807-55B7-47C5-97A6-03233F4FBC3A" } ] } @@ -140,12 +141,18 @@ "references": [ { "url": "http://packetstormsecurity.com/files/156640/Google-Chrome-67-68-69-Object.create-Type-Confusion.html", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.securityfocus.com/bid/105666", "source": "chrome-cve-admin@google.com", "tags": [ + "Broken Link", "Third Party Advisory", "VDB Entry" ] @@ -169,8 +176,8 @@ "url": "https://crbug.com/888923", "source": "chrome-cve-admin@google.com", "tags": [ - "Permissions Required", - "Vendor Advisory" + "Exploit", + "Issue Tracking" ] }, { @@ -184,6 +191,7 @@ "url": "https://www.debian.org/security/2018/dsa-4330", "source": "chrome-cve-admin@google.com", "tags": [ + "Mailing List", "Third Party Advisory" ] } diff --git a/CVE-2018/CVE-2018-174xx/CVE-2018-17480.json b/CVE-2018/CVE-2018-174xx/CVE-2018-17480.json index 004f1c876b9..b76e0a6f3f2 100644 --- a/CVE-2018/CVE-2018-174xx/CVE-2018-17480.json +++ b/CVE-2018/CVE-2018-174xx/CVE-2018-17480.json @@ -2,8 +2,9 @@ "id": "CVE-2018-17480", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2018-12-11T16:29:00.623", - "lastModified": "2023-11-07T02:54:30.293", - "vulnStatus": "Modified", + "lastModified": "2024-06-28T14:22:08.800", + "vulnStatus": "Analyzed", + "cveTags": [], "cisaExploitAdd": "2022-06-08", "cisaActionDue": "2022-06-22", "cisaRequiredAction": "Apply updates per vendor instructions.", @@ -19,13 +20,13 @@ } ], "metrics": { - "cvssMetricV30": [ + "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -140,27 +141,49 @@ "references": [ { "url": "http://www.securityfocus.com/bid/106084", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://access.redhat.com/errata/RHSA-2018:3803", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://crbug.com/905940", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Exploit", + "Issue Tracking" + ] }, { "url": "https://security.gentoo.org/glsa/201908-18", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.debian.org/security/2018/dsa-4352", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2018/CVE-2018-193xx/CVE-2018-19320.json b/CVE-2018/CVE-2018-193xx/CVE-2018-19320.json index 20398895128..66bb21af24d 100644 --- a/CVE-2018/CVE-2018-193xx/CVE-2018-19320.json +++ b/CVE-2018/CVE-2018-193xx/CVE-2018-19320.json @@ -2,8 +2,9 @@ "id": "CVE-2018-19320", "sourceIdentifier": "cve@mitre.org", "published": "2018-12-21T23:29:00.493", - "lastModified": "2020-08-24T17:37:01.140", - "vulnStatus": "Modified", + "lastModified": "2024-06-28T13:55:33.170", + "vulnStatus": "Analyzed", + "cveTags": [], "cisaExploitAdd": "2022-10-24", "cisaActionDue": "2022-11-14", "cisaRequiredAction": "Apply updates per vendor instructions.", @@ -19,13 +20,13 @@ } ], "metrics": { - "cvssMetricV30": [ + "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "LOW", @@ -89,14 +90,14 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:gigabyte:aorus_graphics_engine:*:*:*:*:*:*:*:*", - "versionEndIncluding": "1.33", - "matchCriteriaId": "52BCD5F0-57AB-4A11-B396-EE5D908E86D5" + "versionEndExcluding": "1.57", + "matchCriteriaId": "01B70791-C11D-43F6-A6A9-C685A28AB151" }, { "vulnerable": true, "criteria": "cpe:2.3:a:gigabyte:app_center:*:*:*:*:*:*:*:*", - "versionEndIncluding": "1.05.21", - "matchCriteriaId": "8C35FE64-720F-44B8-9309-AE9A57F71E01" + "versionEndExcluding": "19.0422.1", + "matchCriteriaId": "95BFAF57-A54C-4BA9-A775-066995CAD473" }, { "vulnerable": true, @@ -106,8 +107,8 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:gigabyte:xtreme_gaming_engine:*:*:*:*:*:*:*:*", - "versionEndIncluding": "1.25", - "matchCriteriaId": "B9CB61B1-F972-46C1-B71E-5913533C3759" + "versionEndExcluding": "1.26", + "matchCriteriaId": "8222B91D-A7CD-44FD-B2C9-BA6A72E7194A" } ] } @@ -128,17 +129,24 @@ "url": "http://www.securityfocus.com/bid/106252", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Third Party Advisory", "VDB Entry" ] }, { "url": "https://www.gigabyte.com/Support/Security/1801", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.gigabyte.com/tw/Support/Utility/Graphics-Card", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "https://www.secureauth.com/labs/advisories/gigabyte-drivers-elevation-privilege-vulnerabilities", diff --git a/CVE-2018/CVE-2018-193xx/CVE-2018-19321.json b/CVE-2018/CVE-2018-193xx/CVE-2018-19321.json index 087fa0119e5..e527f4a7b02 100644 --- a/CVE-2018/CVE-2018-193xx/CVE-2018-19321.json +++ b/CVE-2018/CVE-2018-193xx/CVE-2018-19321.json @@ -2,8 +2,9 @@ "id": "CVE-2018-19321", "sourceIdentifier": "cve@mitre.org", "published": "2018-12-21T23:29:00.573", - "lastModified": "2020-05-19T13:15:11.107", - "vulnStatus": "Modified", + "lastModified": "2024-06-28T13:55:54.210", + "vulnStatus": "Analyzed", + "cveTags": [], "cisaExploitAdd": "2022-10-24", "cisaActionDue": "2022-11-14", "cisaRequiredAction": "Apply updates per vendor instructions.", @@ -19,13 +20,13 @@ } ], "metrics": { - "cvssMetricV30": [ + "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "LOW", @@ -89,14 +90,14 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:gigabyte:aorus_graphics_engine:*:*:*:*:*:*:*:*", - "versionEndIncluding": "1.33", - "matchCriteriaId": "52BCD5F0-57AB-4A11-B396-EE5D908E86D5" + "versionEndExcluding": "1.57", + "matchCriteriaId": "01B70791-C11D-43F6-A6A9-C685A28AB151" }, { "vulnerable": true, "criteria": "cpe:2.3:a:gigabyte:app_center:*:*:*:*:*:*:*:*", - "versionEndIncluding": "1.05.21", - "matchCriteriaId": "8C35FE64-720F-44B8-9309-AE9A57F71E01" + "versionEndExcluding": "19.0422.1", + "matchCriteriaId": "95BFAF57-A54C-4BA9-A775-066995CAD473" }, { "vulnerable": true, @@ -106,8 +107,8 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:gigabyte:xtreme_gaming_engine:*:*:*:*:*:*:*:*", - "versionEndIncluding": "1.25", - "matchCriteriaId": "B9CB61B1-F972-46C1-B71E-5913533C3759" + "versionEndExcluding": "1.26", + "matchCriteriaId": "8222B91D-A7CD-44FD-B2C9-BA6A72E7194A" } ] } @@ -128,13 +129,17 @@ "url": "http://www.securityfocus.com/bid/106252", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Third Party Advisory", "VDB Entry" ] }, { "url": "https://www.gigabyte.com/Support/Security/1801", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.secureauth.com/labs/advisories/gigabyte-drivers-elevation-privilege-vulnerabilities", diff --git a/CVE-2018/CVE-2018-193xx/CVE-2018-19322.json b/CVE-2018/CVE-2018-193xx/CVE-2018-19322.json index 300b90e08e9..162db069f40 100644 --- a/CVE-2018/CVE-2018-193xx/CVE-2018-19322.json +++ b/CVE-2018/CVE-2018-193xx/CVE-2018-19322.json @@ -2,8 +2,9 @@ "id": "CVE-2018-19322", "sourceIdentifier": "cve@mitre.org", "published": "2018-12-21T23:29:00.650", - "lastModified": "2020-05-19T13:15:11.200", - "vulnStatus": "Modified", + "lastModified": "2024-06-28T13:56:22.943", + "vulnStatus": "Analyzed", + "cveTags": [], "cisaExploitAdd": "2022-10-24", "cisaActionDue": "2022-11-14", "cisaRequiredAction": "Apply updates per vendor instructions.", @@ -19,13 +20,13 @@ } ], "metrics": { - "cvssMetricV30": [ + "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "LOW", @@ -89,8 +90,8 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:gigabyte:aorus_graphics_engine:*:*:*:*:*:*:*:*", - "versionEndIncluding": "1.33", - "matchCriteriaId": "52BCD5F0-57AB-4A11-B396-EE5D908E86D5" + "versionEndExcluding": "1.57", + "matchCriteriaId": "01B70791-C11D-43F6-A6A9-C685A28AB151" }, { "vulnerable": true, @@ -106,8 +107,8 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:gigabyte:xtreme_gaming_engine:*:*:*:*:*:*:*:*", - "versionEndIncluding": "1.25", - "matchCriteriaId": "B9CB61B1-F972-46C1-B71E-5913533C3759" + "versionEndExcluding": "1.26", + "matchCriteriaId": "8222B91D-A7CD-44FD-B2C9-BA6A72E7194A" } ] } @@ -128,17 +129,24 @@ "url": "http://www.securityfocus.com/bid/106252", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Third Party Advisory", "VDB Entry" ] }, { "url": "https://www.gigabyte.com/Support/Security/1801", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.gigabyte.com/tw/Support/Utility/Graphics-Card", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "https://www.secureauth.com/labs/advisories/gigabyte-drivers-elevation-privilege-vulnerabilities", diff --git a/CVE-2018/CVE-2018-193xx/CVE-2018-19323.json b/CVE-2018/CVE-2018-193xx/CVE-2018-19323.json index 83e33b4971c..ce17081b96f 100644 --- a/CVE-2018/CVE-2018-193xx/CVE-2018-19323.json +++ b/CVE-2018/CVE-2018-193xx/CVE-2018-19323.json @@ -2,8 +2,9 @@ "id": "CVE-2018-19323", "sourceIdentifier": "cve@mitre.org", "published": "2018-12-21T23:29:00.730", - "lastModified": "2020-05-19T13:15:11.357", - "vulnStatus": "Modified", + "lastModified": "2024-06-28T13:56:35.130", + "vulnStatus": "Analyzed", + "cveTags": [], "cisaExploitAdd": "2022-10-24", "cisaActionDue": "2022-11-14", "cisaRequiredAction": "Apply updates per vendor instructions.", @@ -19,13 +20,13 @@ } ], "metrics": { - "cvssMetricV30": [ + "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -89,8 +90,8 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:gigabyte:aorus_graphics_engine:*:*:*:*:*:*:*:*", - "versionEndIncluding": "1.33", - "matchCriteriaId": "52BCD5F0-57AB-4A11-B396-EE5D908E86D5" + "versionEndExcluding": "1.57", + "matchCriteriaId": "01B70791-C11D-43F6-A6A9-C685A28AB151" }, { "vulnerable": true, @@ -106,8 +107,8 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:gigabyte:xtreme_gaming_engine:*:*:*:*:*:*:*:*", - "versionEndIncluding": "1.25", - "matchCriteriaId": "B9CB61B1-F972-46C1-B71E-5913533C3759" + "versionEndExcluding": "1.26", + "matchCriteriaId": "8222B91D-A7CD-44FD-B2C9-BA6A72E7194A" } ] } @@ -128,17 +129,24 @@ "url": "http://www.securityfocus.com/bid/106252", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Third Party Advisory", "VDB Entry" ] }, { "url": "https://www.gigabyte.com/Support/Security/1801", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.gigabyte.com/tw/Support/Utility/Graphics-Card", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "https://www.secureauth.com/labs/advisories/gigabyte-drivers-elevation-privilege-vulnerabilities", diff --git a/CVE-2018/CVE-2018-54xx/CVE-2018-5430.json b/CVE-2018/CVE-2018-54xx/CVE-2018-5430.json index 3fb475770d3..5c3655e9c67 100644 --- a/CVE-2018/CVE-2018-54xx/CVE-2018-5430.json +++ b/CVE-2018/CVE-2018-54xx/CVE-2018-5430.json @@ -2,8 +2,9 @@ "id": "CVE-2018-5430", "sourceIdentifier": "security@tibco.com", "published": "2018-04-17T18:29:00.293", - "lastModified": "2019-10-09T23:41:20.280", - "vulnStatus": "Modified", + "lastModified": "2024-06-28T13:46:02.897", + "vulnStatus": "Analyzed", + "cveTags": [], "cisaExploitAdd": "2022-12-29", "cisaActionDue": "2023-01-19", "cisaRequiredAction": "Apply updates per vendor instructions.", @@ -19,13 +20,13 @@ } ], "metrics": { - "cvssMetricV30": [ + "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", @@ -39,7 +40,9 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 - }, + } + ], + "cvssMetricV30": [ { "source": "security@tibco.com", "type": "Secondary", @@ -198,6 +201,7 @@ "url": "https://www.tibco.com/support/advisories/2018/04/tibco-security-advisory-april-17-2018-tibco-jasperreports-2018-5430", "source": "security@tibco.com", "tags": [ + "Broken Link", "Vendor Advisory" ] } diff --git a/CVE-2018/CVE-2018-60xx/CVE-2018-6065.json b/CVE-2018/CVE-2018-60xx/CVE-2018-6065.json index 192943e6e6b..9ef6ec9f4a6 100644 --- a/CVE-2018/CVE-2018-60xx/CVE-2018-6065.json +++ b/CVE-2018/CVE-2018-60xx/CVE-2018-6065.json @@ -2,8 +2,9 @@ "id": "CVE-2018-6065", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2018-11-14T15:29:01.250", - "lastModified": "2023-11-07T02:59:07.077", - "vulnStatus": "Modified", + "lastModified": "2024-06-28T14:21:58.523", + "vulnStatus": "Analyzed", + "cveTags": [], "cisaExploitAdd": "2022-06-08", "cisaActionDue": "2022-06-22", "cisaRequiredAction": "Apply updates per vendor instructions.", @@ -19,13 +20,13 @@ } ], "metrics": { - "cvssMetricV30": [ + "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -75,10 +76,6 @@ { "lang": "en", "value": "CWE-190" - }, - { - "lang": "en", - "value": "CWE-787" } ] } @@ -159,31 +156,60 @@ "references": [ { "url": "http://www.securityfocus.com/bid/103297", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://access.redhat.com/errata/RHSA-2018:0484", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://chromereleases.googleblog.com/2018/03/stable-channel-update-for-desktop.html", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://crbug.com/808192", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Exploit", + "Issue Tracking" + ] }, { "url": "https://www.debian.org/security/2018/dsa-4182", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://www.exploit-db.com/exploits/44584/", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-19-367/", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2019/CVE-2019-71xx/CVE-2019-7193.json b/CVE-2019/CVE-2019-71xx/CVE-2019-7193.json index 6403978525e..9fa7897e86a 100644 --- a/CVE-2019/CVE-2019-71xx/CVE-2019-7193.json +++ b/CVE-2019/CVE-2019-71xx/CVE-2019-7193.json @@ -2,8 +2,9 @@ "id": "CVE-2019-7193", "sourceIdentifier": "security@qnapsecurity.com.tw", "published": "2019-12-05T17:15:13.027", - "lastModified": "2020-05-28T18:15:11.127", - "vulnStatus": "Modified", + "lastModified": "2024-06-28T14:21:38.963", + "vulnStatus": "Analyzed", + "cveTags": [], "cisaExploitAdd": "2022-06-08", "cisaActionDue": "2022-06-22", "cisaRequiredAction": "Apply updates per vendor instructions.", @@ -174,7 +175,12 @@ "references": [ { "url": "http://packetstormsecurity.com/files/157857/QNAP-QTS-And-Photo-Station-6.0.3-Remote-Command-Execution.html", - "source": "security@qnapsecurity.com.tw" + "source": "security@qnapsecurity.com.tw", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://www.qnap.com/zh-tw/security-advisory/nas-201911-25", diff --git a/CVE-2020/CVE-2020-289xx/CVE-2020-28949.json b/CVE-2020/CVE-2020-289xx/CVE-2020-28949.json index ddeb8ab871b..79749ecb110 100644 --- a/CVE-2020/CVE-2020-289xx/CVE-2020-28949.json +++ b/CVE-2020/CVE-2020-289xx/CVE-2020-28949.json @@ -2,8 +2,9 @@ "id": "CVE-2020-28949", "sourceIdentifier": "cve@mitre.org", "published": "2020-11-19T19:15:11.937", - "lastModified": "2023-11-07T03:21:24.953", - "vulnStatus": "Modified", + "lastModified": "2024-06-28T14:06:49.747", + "vulnStatus": "Analyzed", + "cveTags": [], "cisaExploitAdd": "2022-08-25", "cisaActionDue": "2022-09-15", "cisaRequiredAction": "Apply updates per vendor instructions.", @@ -201,7 +202,7 @@ "tags": [ "Exploit", "Issue Tracking", - "Third Party Advisory" + "Vendor Advisory" ] }, { @@ -214,27 +215,45 @@ }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/42GPGVVFTLJYAKRI75IVB5R45NYQGEUR/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4V35LBRM6HBCXBVCITKQ4UEBTXO2EG7B/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5KSFM672XW3X6BR7TVKRD63SLZGKK437/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KWM4CTMEGAC4I2CHYNJVSROY4CVXVEUT/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NBYZSHYTIOBK6V7C4N7TP6KIKCRKLVWP/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VJQQYDAOWHD6RDITDRPHFW7WY6BS3V5N/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "https://security.gentoo.org/glsa/202101-23", @@ -247,6 +266,7 @@ "url": "https://www.debian.org/security/2020/dsa-4817", "source": "cve@mitre.org", "tags": [ + "Mailing List", "Third Party Advisory" ] }, diff --git a/CVE-2020/CVE-2020-34xx/CVE-2020-3433.json b/CVE-2020/CVE-2020-34xx/CVE-2020-3433.json index d49eb2d78f7..20b2f9ac3dc 100644 --- a/CVE-2020/CVE-2020-34xx/CVE-2020-3433.json +++ b/CVE-2020/CVE-2020-34xx/CVE-2020-3433.json @@ -2,8 +2,9 @@ "id": "CVE-2020-3433", "sourceIdentifier": "ykramarz@cisco.com", "published": "2020-08-17T18:15:12.947", - "lastModified": "2023-11-07T03:22:42.623", - "vulnStatus": "Modified", + "lastModified": "2024-06-28T13:56:43.943", + "vulnStatus": "Analyzed", + "cveTags": [], "cisaExploitAdd": "2022-10-24", "cisaActionDue": "2022-11-14", "cisaRequiredAction": "Apply updates per vendor instructions.", diff --git a/CVE-2020/CVE-2020-361xx/CVE-2020-36193.json b/CVE-2020/CVE-2020-361xx/CVE-2020-36193.json index 13544e3097f..df3e1ddbdcb 100644 --- a/CVE-2020/CVE-2020-361xx/CVE-2020-36193.json +++ b/CVE-2020/CVE-2020-361xx/CVE-2020-36193.json @@ -2,8 +2,9 @@ "id": "CVE-2020-36193", "sourceIdentifier": "cve@mitre.org", "published": "2021-01-18T20:15:12.667", - "lastModified": "2023-11-07T03:22:06.837", - "vulnStatus": "Modified", + "lastModified": "2024-06-28T14:07:11.397", + "vulnStatus": "Analyzed", + "cveTags": [], "cisaExploitAdd": "2022-08-25", "cisaActionDue": "2022-09-15", "cisaRequiredAction": "Apply updates per vendor instructions.", @@ -194,8 +195,7 @@ "url": "https://github.com/pear/Archive_Tar/commit/cde460582ff389404b5b3ccb59374e9b389de916", "source": "cve@mitre.org", "tags": [ - "Patch", - "Third Party Advisory" + "Patch" ] }, { @@ -216,19 +216,31 @@ }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/42GPGVVFTLJYAKRI75IVB5R45NYQGEUR/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FOZNK4FIIV7FSFCJNNFWMJZTTV7NFJV2/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VJQQYDAOWHD6RDITDRPHFW7WY6BS3V5N/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YKD5WEFA4WT6AVTMRAYBNXZNLWZHM7FH/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "https://security.gentoo.org/glsa/202101-23", diff --git a/CVE-2021/CVE-2021-242xx/CVE-2021-24270.json b/CVE-2021/CVE-2021-242xx/CVE-2021-24270.json index 0527f4455c6..033a5e21afc 100644 --- a/CVE-2021/CVE-2021-242xx/CVE-2021-24270.json +++ b/CVE-2021/CVE-2021-242xx/CVE-2021-24270.json @@ -2,8 +2,9 @@ "id": "CVE-2021-24270", "sourceIdentifier": "contact@wpscan.com", "published": "2021-05-05T19:15:08.437", - "lastModified": "2021-05-11T15:23:43.510", + "lastModified": "2024-06-28T13:34:04.863", "vulnStatus": "Analyzed", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -84,9 +85,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:dethemekit_for_elementor_project:dethemekit_for_elementor:*:*:*:*:*:wordpress:*:*", + "criteria": "cpe:2.3:a:detheme:dethemekit_for_elementor:*:*:*:*:*:wordpress:*:*", "versionEndExcluding": "1.5.5.5", - "matchCriteriaId": "84F60B01-27DB-4C9A-85EC-41F3AD516BC1" + "matchCriteriaId": "A4FBD39E-3F44-40DE-BB9D-AA81ABCB7ACA" } ] } diff --git a/CVE-2021/CVE-2021-305xx/CVE-2021-30533.json b/CVE-2021/CVE-2021-305xx/CVE-2021-30533.json index f6d4177a95f..bdc69c217b3 100644 --- a/CVE-2021/CVE-2021-305xx/CVE-2021-30533.json +++ b/CVE-2021/CVE-2021-305xx/CVE-2021-30533.json @@ -2,8 +2,9 @@ "id": "CVE-2021-30533", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2021-06-07T20:15:08.730", - "lastModified": "2024-02-15T02:00:01.650", - "vulnStatus": "Modified", + "lastModified": "2024-06-28T14:13:32.650", + "vulnStatus": "Analyzed", + "cveTags": [], "cisaExploitAdd": "2022-06-27", "cisaActionDue": "2022-07-18", "cisaRequiredAction": "Apply updates per vendor instructions.", @@ -133,17 +134,24 @@ "Exploit", "Issue Tracking", "Patch", - "Permissions Required", "Vendor Advisory" ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ETMZL6IHCTCTREEL434BQ4THQ7EOHJ43/", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Mailing List", + "Release Notes" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PAT6EOXVQFE6JFMFQF4IKAOUQSHMHL54/", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Mailing List", + "Release Notes" + ] }, { "url": "https://security.gentoo.org/glsa/202107-06", diff --git a/CVE-2021/CVE-2021-309xx/CVE-2021-30900.json b/CVE-2021/CVE-2021-309xx/CVE-2021-30900.json index 841255bef78..2991431e72b 100644 --- a/CVE-2021/CVE-2021-309xx/CVE-2021-30900.json +++ b/CVE-2021/CVE-2021-309xx/CVE-2021-30900.json @@ -2,8 +2,9 @@ "id": "CVE-2021-30900", "sourceIdentifier": "product-security@apple.com", "published": "2021-08-24T19:15:18.083", - "lastModified": "2023-11-07T03:33:45.910", - "vulnStatus": "Modified", + "lastModified": "2024-06-28T13:40:36.333", + "vulnStatus": "Analyzed", + "cveTags": [], "cisaExploitAdd": "2023-03-30", "cisaActionDue": "2023-04-20", "cisaRequiredAction": "Apply updates per vendor instructions.", @@ -122,15 +123,24 @@ "references": [ { "url": "https://support.apple.com/en-us/HT212867", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT212868", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/kb/HT212872", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-309xx/CVE-2021-30983.json b/CVE-2021/CVE-2021-309xx/CVE-2021-30983.json index dc0dda99b23..e04d43bf784 100644 --- a/CVE-2021/CVE-2021-309xx/CVE-2021-30983.json +++ b/CVE-2021/CVE-2021-309xx/CVE-2021-30983.json @@ -2,8 +2,9 @@ "id": "CVE-2021-30983", "sourceIdentifier": "product-security@apple.com", "published": "2021-08-24T19:15:23.507", - "lastModified": "2023-11-07T03:34:11.693", - "vulnStatus": "Modified", + "lastModified": "2024-06-28T14:13:38.343", + "vulnStatus": "Analyzed", + "cveTags": [], "cisaExploitAdd": "2022-06-27", "cisaActionDue": "2022-07-18", "cisaRequiredAction": "Apply updates per vendor instructions.", @@ -74,7 +75,7 @@ "description": [ { "lang": "en", - "value": "CWE-119" + "value": "CWE-120" } ] } @@ -106,7 +107,11 @@ "references": [ { "url": "https://support.apple.com/en-us/HT212976", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-310xx/CVE-2021-31010.json b/CVE-2021/CVE-2021-310xx/CVE-2021-31010.json index 9a9c54735ae..da15d271099 100644 --- a/CVE-2021/CVE-2021-310xx/CVE-2021-31010.json +++ b/CVE-2021/CVE-2021-310xx/CVE-2021-31010.json @@ -2,8 +2,9 @@ "id": "CVE-2021-31010", "sourceIdentifier": "product-security@apple.com", "published": "2021-08-24T19:15:24.967", - "lastModified": "2023-11-07T03:34:19.760", - "vulnStatus": "Modified", + "lastModified": "2024-06-28T14:07:36.563", + "vulnStatus": "Analyzed", + "cveTags": [], "cisaExploitAdd": "2022-08-25", "cisaActionDue": "2022-09-15", "cisaRequiredAction": "Apply updates per vendor instructions.", @@ -214,23 +215,38 @@ "references": [ { "url": "https://support.apple.com/en-us/HT212804", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT212805", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT212806", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT212807", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT212824", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-381xx/CVE-2021-38163.json b/CVE-2021/CVE-2021-381xx/CVE-2021-38163.json index 82d0f319208..866071eae85 100644 --- a/CVE-2021/CVE-2021-381xx/CVE-2021-38163.json +++ b/CVE-2021/CVE-2021-381xx/CVE-2021-38163.json @@ -2,8 +2,9 @@ "id": "CVE-2021-38163", "sourceIdentifier": "cna@sap.com", "published": "2021-09-14T12:15:10.890", - "lastModified": "2023-08-08T14:21:49.707", - "vulnStatus": "Modified", + "lastModified": "2024-06-28T14:14:53.897", + "vulnStatus": "Analyzed", + "cveTags": [], "cisaExploitAdd": "2022-06-09", "cisaActionDue": "2022-06-30", "cisaRequiredAction": "Apply updates per vendor instructions.", @@ -143,6 +144,7 @@ "url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=585106405", "source": "cna@sap.com", "tags": [ + "Broken Link", "Vendor Advisory" ] } diff --git a/CVE-2021/CVE-2021-391xx/CVE-2021-39144.json b/CVE-2021/CVE-2021-391xx/CVE-2021-39144.json index 845b0665636..e880e1899be 100644 --- a/CVE-2021/CVE-2021-391xx/CVE-2021-39144.json +++ b/CVE-2021/CVE-2021-391xx/CVE-2021-39144.json @@ -2,8 +2,9 @@ "id": "CVE-2021-39144", "sourceIdentifier": "security-advisories@github.com", "published": "2021-08-23T18:15:12.087", - "lastModified": "2023-11-07T03:37:33.077", - "vulnStatus": "Modified", + "lastModified": "2024-06-28T13:42:30.620", + "vulnStatus": "Analyzed", + "cveTags": [], "cisaExploitAdd": "2023-03-10", "cisaActionDue": "2023-03-31", "cisaRequiredAction": "Apply updates per vendor instructions.", @@ -377,15 +378,27 @@ }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/22KVR6B5IZP3BGQ3HPWIO2FWWCKT3DHP/", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Mailing List", + "Release Notes" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PVPHZA7VW2RRSDCOIPP2W6O5ND254TU7/", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Mailing List", + "Release Notes" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QGXIU3YDPG6OGTDHMBLAFN7BPBERXREB/", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Mailing List", + "Release Notes" + ] }, { "url": "https://security.netapp.com/advisory/ntap-20210923-0003/", diff --git a/CVE-2021/CVE-2021-392xx/CVE-2021-39226.json b/CVE-2021/CVE-2021-392xx/CVE-2021-39226.json index b6f26304e4a..2ef378b9a2f 100644 --- a/CVE-2021/CVE-2021-392xx/CVE-2021-39226.json +++ b/CVE-2021/CVE-2021-392xx/CVE-2021-39226.json @@ -2,8 +2,9 @@ "id": "CVE-2021-39226", "sourceIdentifier": "security-advisories@github.com", "published": "2021-10-05T18:15:07.947", - "lastModified": "2023-11-07T03:37:36.990", - "vulnStatus": "Modified", + "lastModified": "2024-06-28T14:05:43.580", + "vulnStatus": "Analyzed", + "cveTags": [], "cisaExploitAdd": "2022-08-25", "cisaActionDue": "2022-09-15", "cisaRequiredAction": "Apply updates per vendor instructions.", @@ -167,46 +168,49 @@ "url": "https://github.com/grafana/grafana/commit/2d456a6375855364d098ede379438bf7f0667269", "source": "security-advisories@github.com", "tags": [ - "Patch", - "Third Party Advisory" + "Patch" ] }, { "url": "https://github.com/grafana/grafana/security/advisories/GHSA-69j6-29vr-p3j9", "source": "security-advisories@github.com", "tags": [ - "Third Party Advisory" + "Exploit", + "Vendor Advisory" ] }, { "url": "https://grafana.com/docs/grafana/latest/release-notes/release-notes-7-5-11/", "source": "security-advisories@github.com", "tags": [ - "Release Notes", - "Vendor Advisory" + "Release Notes" ] }, { "url": "https://grafana.com/docs/grafana/latest/release-notes/release-notes-8-1-6/", "source": "security-advisories@github.com", "tags": [ - "Release Notes", - "Vendor Advisory" + "Release Notes" ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DCKBFUSY6V4VU5AQUYWKISREZX5NLQJT/", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E6ANHRDBXQT6TURLP2THM26ZPDINFBEG/", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://security.netapp.com/advisory/ntap-20211029-0008/", "source": "security-advisories@github.com", "tags": [ - "Mailing List", "Third Party Advisory" ] } diff --git a/CVE-2021/CVE-2021-40xx/CVE-2021-4034.json b/CVE-2021/CVE-2021-40xx/CVE-2021-4034.json index f67fac3d7fd..cdf1bf23920 100644 --- a/CVE-2021/CVE-2021-40xx/CVE-2021-4034.json +++ b/CVE-2021/CVE-2021-40xx/CVE-2021-4034.json @@ -2,8 +2,9 @@ "id": "CVE-2021-4034", "sourceIdentifier": "secalert@redhat.com", "published": "2022-01-28T20:15:12.193", - "lastModified": "2023-11-07T03:40:06.873", - "vulnStatus": "Modified", + "lastModified": "2024-06-28T14:14:04.403", + "vulnStatus": "Analyzed", + "cveTags": [], "cisaExploitAdd": "2022-06-27", "cisaActionDue": "2022-07-18", "cisaRequiredAction": "Apply updates per vendor instructions.", @@ -496,8 +497,7 @@ "source": "secalert@redhat.com", "tags": [ "Issue Tracking", - "Patch", - "Vendor Advisory" + "Patch" ] }, { @@ -511,14 +511,14 @@ "url": "https://gitlab.freedesktop.org/polkit/polkit/-/commit/a2bf5c9c83b6ae46cbd5c779d3055bff81ded683", "source": "secalert@redhat.com", "tags": [ - "Patch", - "Third Party Advisory" + "Patch" ] }, { "url": "https://www.oracle.com/security-alerts/cpuapr2022.html", "source": "secalert@redhat.com", "tags": [ + "Patch", "Third Party Advisory" ] }, @@ -533,7 +533,11 @@ }, { "url": "https://www.secpod.com/blog/local-privilege-escalation-vulnerability-in-major-linux-distributions-cve-2021-4034/", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://www.starwindsoftware.com/security/sw-20220818-0001/", diff --git a/CVE-2022/CVE-2022-215xx/CVE-2022-21587.json b/CVE-2022/CVE-2022-215xx/CVE-2022-21587.json index d76d174baf6..231845bc092 100644 --- a/CVE-2022/CVE-2022-215xx/CVE-2022-21587.json +++ b/CVE-2022/CVE-2022-215xx/CVE-2022-21587.json @@ -2,8 +2,9 @@ "id": "CVE-2022-21587", "sourceIdentifier": "secalert_us@oracle.com", "published": "2022-10-18T21:15:10.960", - "lastModified": "2023-08-08T14:21:49.707", - "vulnStatus": "Modified", + "lastModified": "2024-06-28T13:44:41.740", + "vulnStatus": "Analyzed", + "cveTags": [], "cisaExploitAdd": "2023-02-02", "cisaActionDue": "2023-02-23", "cisaRequiredAction": "Apply updates per vendor instructions.", @@ -76,7 +77,12 @@ "references": [ { "url": "http://packetstormsecurity.com/files/171208/Oracle-E-Business-Suite-EBS-Unauthenticated-Arbitrary-File-Upload.html", - "source": "secalert_us@oracle.com" + "source": "secalert_us@oracle.com", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://www.oracle.com/security-alerts/cpuoct2022.html", diff --git a/CVE-2022/CVE-2022-219xx/CVE-2022-21971.json b/CVE-2022/CVE-2022-219xx/CVE-2022-21971.json index 78309debf8b..1d7c3ff2407 100644 --- a/CVE-2022/CVE-2022-219xx/CVE-2022-21971.json +++ b/CVE-2022/CVE-2022-219xx/CVE-2022-21971.json @@ -2,8 +2,9 @@ "id": "CVE-2022-21971", "sourceIdentifier": "secure@microsoft.com", "published": "2022-02-09T17:15:08.640", - "lastModified": "2023-08-08T14:21:49.707", - "vulnStatus": "Modified", + "lastModified": "2024-06-28T14:12:22.867", + "vulnStatus": "Analyzed", + "cveTags": [], "cisaExploitAdd": "2022-08-18", "cisaActionDue": "2022-09-08", "cisaRequiredAction": "Apply updates per vendor instructions.", @@ -88,103 +89,57 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:arm64:*", - "matchCriteriaId": "610B33F9-0309-4CF7-B7E4-5152D9B2FFE4" + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.2565", + "matchCriteriaId": "F47D7D57-5C24-46D8-A515-8007757F5498" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:x64:*", - "matchCriteriaId": "21074553-EDF2-468D-8E79-C39851B5BC79" + "criteria": "cpe:2.3:o:microsoft:windows_10_1909:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.18363.2094", + "matchCriteriaId": "3BF8B084-27DC-4F86-B801-B62FE796FF50" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:x86:*", - "matchCriteriaId": "4E62F9CB-D1B6-4B4D-BCCD-7F4D36A73B4D" + "criteria": "cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19042.1526", + "matchCriteriaId": "B3D9A9C7-8331-4549-9153-65BDD758A583" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:arm64:*", - "matchCriteriaId": "49A4BBDA-0389-4171-AA49-6837F7DF4454" + "criteria": "cpe:2.3:o:microsoft:windows_10_21h1:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19043.1526", + "matchCriteriaId": "B40311C2-4ED8-4B9A-B9B5-2CCAB28EEA66" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:x64:*", - "matchCriteriaId": "F8C238FA-B20F-40A5-B861-A8295858F4BE" + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19044.1526", + "matchCriteriaId": "05511CD6-CBAB-4534-A8E3-B846ECC3DDFF" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:x86:*", - "matchCriteriaId": "56513BCA-A9F5-4112-BDE6-77E9B8D2677E" + "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22000.493", + "matchCriteriaId": "9B3F7AF6-7251-4EF7-B044-99699E97B5C9" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:arm64:*", - "matchCriteriaId": "665EA912-D724-41EB-86A9-24EB4FE87B54" + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.2565", + "matchCriteriaId": "B5E25CB9-F0C4-44F2-A302-41D2C7C9DB4A" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:x64:*", - "matchCriteriaId": "77E07B96-EAAA-4DD6-9172-0DE98A36726F" + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.20348.524", + "matchCriteriaId": "97C266DC-3AD4-4593-A9A8-27F6D5E61AED" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:x86:*", - "matchCriteriaId": "B846A736-E77C-4665-B28B-4E511880D575" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:arm64:*", - "matchCriteriaId": "925B8C67-C96F-4A4D-9BE7-CCCD78EF3C31" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:x64:*", - "matchCriteriaId": "6CF580BA-6938-40F6-9D86-F43044A6BACA" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:x86:*", - "matchCriteriaId": "C5E038AA-514F-48AC-B45E-859EE32525B4" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:arm64:*", - "matchCriteriaId": "31622391-A67E-4E2A-A855-1316B6E38630" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:x64:*", - "matchCriteriaId": "61F0792D-7587-4297-8EE7-D4DC3A30EE84" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:x86:*", - "matchCriteriaId": "7649042B-4430-4BD9-B82F-984A2831A651" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:arm64:*", - "matchCriteriaId": "B9F64296-66BF-4F1D-A11C-0C44C347E2AC" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:x64:*", - "matchCriteriaId": "5D7F7DDB-440E-42CD-82F4-B2C13F3CC462" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_server:20h2:*:*:*:*:*:*:*", - "matchCriteriaId": "1EAF6DBA-6E3A-4854-BFBF-B5DC36CE5929" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_server:2022:*:*:*:*:*:*:*", - "matchCriteriaId": "BE257836-4F4D-4352-8293-B9CAD34F8794" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", - "matchCriteriaId": "DB79EE26-FC32-417D-A49C-A1A63165A968" + "criteria": "cpe:2.3:o:microsoft:windows_server_20h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19042.1526", + "matchCriteriaId": "E5161F88-F831-4E07-A54F-E3E7A019A355" } ] } @@ -194,7 +149,11 @@ "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21971", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-220xx/CVE-2022-22047.json b/CVE-2022/CVE-2022-220xx/CVE-2022-22047.json index 71e01c93864..e1b80df2886 100644 --- a/CVE-2022/CVE-2022-220xx/CVE-2022-22047.json +++ b/CVE-2022/CVE-2022-220xx/CVE-2022-22047.json @@ -2,8 +2,9 @@ "id": "CVE-2022-22047", "sourceIdentifier": "secure@microsoft.com", "published": "2022-07-12T23:15:10.343", - "lastModified": "2023-08-08T14:21:49.707", - "vulnStatus": "Modified", + "lastModified": "2024-06-28T14:13:17.207", + "vulnStatus": "Analyzed", + "cveTags": [], "cisaExploitAdd": "2022-07-12", "cisaActionDue": "2022-08-02", "cisaRequiredAction": "Apply updates per vendor instructions.", @@ -88,93 +89,45 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x64:*", - "matchCriteriaId": "084984D5-D241-497B-B118-50C6C1EAD468" + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.10240.19360", + "matchCriteriaId": "732250EC-4973-45F2-A5C8-84490C83A2F6" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x86:*", - "matchCriteriaId": "BA592626-F17C-4F46-823B-0947D102BBD2" + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.5246", + "matchCriteriaId": "C8885424-3874-4E1E-A0B1-1C448BA18F89" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:arm64:*", - "matchCriteriaId": "610B33F9-0309-4CF7-B7E4-5152D9B2FFE4" + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.3165", + "matchCriteriaId": "1882BBC0-CD41-4408-9B0A-06D52AE48EA3" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:x64:*", - "matchCriteriaId": "21074553-EDF2-468D-8E79-C39851B5BC79" + "criteria": "cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19042.1826", + "matchCriteriaId": "2BDD71EC-77D8-4FCA-BE6C-54DC78E2B77E" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:x86:*", - "matchCriteriaId": "4E62F9CB-D1B6-4B4D-BCCD-7F4D36A73B4D" + "criteria": "cpe:2.3:o:microsoft:windows_10_21h1:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19043.1826", + "matchCriteriaId": "8B4CD062-7562-4FC7-B278-EA7363C070B4" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:arm64:*", - "matchCriteriaId": "49A4BBDA-0389-4171-AA49-6837F7DF4454" + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19044.1826", + "matchCriteriaId": "0DD63B76-0691-4EFE-874C-9DE83BD9F518" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:x64:*", - "matchCriteriaId": "F8C238FA-B20F-40A5-B861-A8295858F4BE" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:x86:*", - "matchCriteriaId": "56513BCA-A9F5-4112-BDE6-77E9B8D2677E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:arm64:*", - "matchCriteriaId": "665EA912-D724-41EB-86A9-24EB4FE87B54" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:x64:*", - "matchCriteriaId": "77E07B96-EAAA-4DD6-9172-0DE98A36726F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:x86:*", - "matchCriteriaId": "B846A736-E77C-4665-B28B-4E511880D575" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:x64:*", - "matchCriteriaId": "897A48D7-FCA1-4560-AFBB-718AF19BA3A2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:x86:*", - "matchCriteriaId": "507EB48C-F479-424C-8ABA-C279AB4FE3F4" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:arm64:*", - "matchCriteriaId": "925B8C67-C96F-4A4D-9BE7-CCCD78EF3C31" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:x64:*", - "matchCriteriaId": "6CF580BA-6938-40F6-9D86-F43044A6BACA" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:x86:*", - "matchCriteriaId": "C5E038AA-514F-48AC-B45E-859EE32525B4" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:arm64:*", - "matchCriteriaId": "B9F64296-66BF-4F1D-A11C-0C44C347E2AC" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:x64:*", - "matchCriteriaId": "5D7F7DDB-440E-42CD-82F4-B2C13F3CC462" + "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22000.795", + "matchCriteriaId": "8FC308C7-F399-4988-8F9A-15977522DFF7" }, { "vulnerable": true, @@ -228,23 +181,27 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", - "matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7" + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.5246", + "matchCriteriaId": "C0ED1FB6-BC12-4419-AC84-66AF13DEDD74" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*", - "matchCriteriaId": "4A190388-AA82-4504-9D5A-624F23268C9F" + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.3165", + "matchCriteriaId": "6CB4FC36-F70B-4AFE-AB8E-3D7A22C34006" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", - "matchCriteriaId": "DB79EE26-FC32-417D-A49C-A1A63165A968" + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.20348.825", + "matchCriteriaId": "DEE32EBD-EDFC-42BA-9309-9F5480112CC7" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*", - "matchCriteriaId": "821614DD-37DD-44E2-A8A4-FE8D23A33C3C" + "criteria": "cpe:2.3:o:microsoft:windows_server_20h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19042.1826", + "matchCriteriaId": "2EF3803C-2BF7-4F9F-AF3A-BA82A64701ED" } ] } @@ -254,7 +211,11 @@ "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-22047", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-225xx/CVE-2022-22536.json b/CVE-2022/CVE-2022-225xx/CVE-2022-22536.json index a1933166dd9..1c429a5c9f8 100644 --- a/CVE-2022/CVE-2022-225xx/CVE-2022-22536.json +++ b/CVE-2022/CVE-2022-225xx/CVE-2022-22536.json @@ -2,8 +2,9 @@ "id": "CVE-2022-22536", "sourceIdentifier": "cna@sap.com", "published": "2022-02-09T23:15:18.620", - "lastModified": "2023-09-27T15:15:58.430", - "vulnStatus": "Modified", + "lastModified": "2024-06-28T14:08:51.130", + "vulnStatus": "Analyzed", + "cveTags": [], "cisaExploitAdd": "2022-08-18", "cisaActionDue": "2022-09-08", "cisaRequiredAction": "Apply updates per vendor instructions.", @@ -226,14 +227,14 @@ "url": "https://launchpad.support.sap.com/#/notes/3123396", "source": "cna@sap.com", "tags": [ - "Permissions Required", - "Vendor Advisory" + "Permissions Required" ] }, { "url": "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html", "source": "cna@sap.com", "tags": [ + "Not Applicable", "Vendor Advisory" ] } diff --git a/CVE-2022/CVE-2022-229xx/CVE-2022-22963.json b/CVE-2022/CVE-2022-229xx/CVE-2022-22963.json index 27e44edbba3..adfc97ec39f 100644 --- a/CVE-2022/CVE-2022-229xx/CVE-2022-22963.json +++ b/CVE-2022/CVE-2022-229xx/CVE-2022-22963.json @@ -2,8 +2,9 @@ "id": "CVE-2022-22963", "sourceIdentifier": "security@vmware.com", "published": "2022-04-01T23:15:13.663", - "lastModified": "2023-07-13T23:15:09.393", - "vulnStatus": "Modified", + "lastModified": "2024-06-28T14:08:19.670", + "vulnStatus": "Analyzed", + "cveTags": [], "cisaExploitAdd": "2022-08-25", "cisaActionDue": "2022-09-15", "cisaRequiredAction": "Apply updates per vendor instructions.", @@ -353,7 +354,12 @@ "references": [ { "url": "http://packetstormsecurity.com/files/173430/Spring-Cloud-3.2.2-Remote-Command-Execution.html", - "source": "security@vmware.com" + "source": "security@vmware.com", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0005", diff --git a/CVE-2022/CVE-2022-22xx/CVE-2022-2294.json b/CVE-2022/CVE-2022-22xx/CVE-2022-2294.json index 20d843dab02..915b8d916b0 100644 --- a/CVE-2022/CVE-2022-22xx/CVE-2022-2294.json +++ b/CVE-2022/CVE-2022-22xx/CVE-2022-2294.json @@ -2,8 +2,9 @@ "id": "CVE-2022-2294", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2022-07-28T02:15:07.797", - "lastModified": "2023-11-25T11:15:09.417", - "vulnStatus": "Modified", + "lastModified": "2024-06-28T14:08:30.807", + "vulnStatus": "Analyzed", + "cveTags": [], "cisaExploitAdd": "2022-08-25", "cisaActionDue": "2022-09-15", "cisaRequiredAction": "Apply updates per vendor instructions.", @@ -293,17 +294,22 @@ "url": "https://crbug.com/1341043", "source": "chrome-cve-admin@google.com", "tags": [ - "Permissions Required", - "Vendor Advisory" + "Permissions Required" ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5BQRTR4SIUNIHLLPWTGYSDNQK7DYCRSB/", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H2C4XOJVIILDXTOSMWJXHSQNEXFWSOD7/", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://security.gentoo.org/glsa/202208-35", @@ -321,7 +327,10 @@ }, { "url": "https://security.gentoo.org/glsa/202311-11", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-247xx/CVE-2022-24706.json b/CVE-2022/CVE-2022-247xx/CVE-2022-24706.json index cffa5fa1099..c4161b22b5f 100644 --- a/CVE-2022/CVE-2022-247xx/CVE-2022-24706.json +++ b/CVE-2022/CVE-2022-247xx/CVE-2022-24706.json @@ -2,8 +2,9 @@ "id": "CVE-2022-24706", "sourceIdentifier": "security@apache.org", "published": "2022-04-26T10:15:35.083", - "lastModified": "2023-11-07T03:44:33.733", - "vulnStatus": "Modified", + "lastModified": "2024-06-28T14:06:29.153", + "vulnStatus": "Analyzed", + "cveTags": [], "cisaExploitAdd": "2022-08-25", "cisaActionDue": "2022-09-15", "cisaRequiredAction": "Apply updates per vendor instructions.", @@ -173,6 +174,7 @@ "url": "https://docs.couchdb.org/en/3.2.2/setup/cluster.html", "source": "security@apache.org", "tags": [ + "Broken Link", "Product" ] }, @@ -186,7 +188,11 @@ }, { "url": "https://medium.com/%40_sadshade/couchdb-erlang-and-cookies-rce-on-default-settings-b1e9173a4bcd", - "source": "security@apache.org" + "source": "security@apache.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-249xx/CVE-2022-24990.json b/CVE-2022/CVE-2022-249xx/CVE-2022-24990.json index f1af37167e7..634b7ce0193 100644 --- a/CVE-2022/CVE-2022-249xx/CVE-2022-24990.json +++ b/CVE-2022/CVE-2022-249xx/CVE-2022-24990.json @@ -2,8 +2,9 @@ "id": "CVE-2022-24990", "sourceIdentifier": "cve@mitre.org", "published": "2023-02-07T18:15:09.100", - "lastModified": "2023-08-08T14:21:49.707", - "vulnStatus": "Modified", + "lastModified": "2024-06-28T13:44:20.137", + "vulnStatus": "Analyzed", + "cveTags": [], "cisaExploitAdd": "2023-02-10", "cisaActionDue": "2023-03-03", "cisaRequiredAction": "Apply updates per vendor instructions.", @@ -223,7 +224,12 @@ "references": [ { "url": "http://packetstormsecurity.com/files/172904/TerraMaster-TOS-4.2.29-Remote-Code-Execution.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://forum.terra-master.com/en/viewforum.php?f=28", diff --git a/CVE-2022/CVE-2022-261xx/CVE-2022-26134.json b/CVE-2022/CVE-2022-261xx/CVE-2022-26134.json index 814e5d4de69..f46ff05cce2 100644 --- a/CVE-2022/CVE-2022-261xx/CVE-2022-26134.json +++ b/CVE-2022/CVE-2022-261xx/CVE-2022-26134.json @@ -2,8 +2,9 @@ "id": "CVE-2022-26134", "sourceIdentifier": "security@atlassian.com", "published": "2022-06-03T22:15:07.717", - "lastModified": "2023-08-08T14:22:24.967", - "vulnStatus": "Modified", + "lastModified": "2024-06-28T14:22:46.883", + "vulnStatus": "Analyzed", + "cveTags": [], "cisaExploitAdd": "2022-06-02", "cisaActionDue": "2022-06-06", "cisaRequiredAction": "Immediately block all internet traffic to and from affected products AND apply the update per vendor instructions [https://confluence.atlassian.com/doc/confluence-security-advisory-2022-06-02-1130377146.html] OR remove the affected products by the due date on the right. Note: Once the update is successfully deployed, agencies can reassess the internet blocking rules.", @@ -222,12 +223,16 @@ }, { "url": "https://confluence.atlassian.com/doc/confluence-security-advisory-2022-06-02-1130377146.html", - "source": "security@atlassian.com" + "source": "security@atlassian.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://jira.atlassian.com/browse/CONFSERVER-79016", "source": "security@atlassian.com", "tags": [ + "Issue Tracking", "Patch", "Vendor Advisory" ] diff --git a/CVE-2022/CVE-2022-262xx/CVE-2022-26258.json b/CVE-2022/CVE-2022-262xx/CVE-2022-26258.json index 01cef95de28..6ca7e03b67b 100644 --- a/CVE-2022/CVE-2022-262xx/CVE-2022-26258.json +++ b/CVE-2022/CVE-2022-262xx/CVE-2022-26258.json @@ -2,8 +2,9 @@ "id": "CVE-2022-26258", "sourceIdentifier": "cve@mitre.org", "published": "2022-03-28T00:15:07.813", - "lastModified": "2023-08-08T14:21:49.707", - "vulnStatus": "Modified", + "lastModified": "2024-06-28T14:04:48.993", + "vulnStatus": "Analyzed", + "cveTags": [], "cisaExploitAdd": "2022-09-08", "cisaActionDue": "2022-09-29", "cisaRequiredAction": "The impacted product is end-of-life and should be disconnected if still in use.", @@ -120,25 +121,31 @@ "url": "http://dlink.com", "source": "cve@mitre.org", "tags": [ - "Vendor Advisory" + "Product" ] }, { "url": "https://github.com/skyedai910/Vuln/tree/master/DIR-820L/command_execution_0", "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Exploit", + "Third Party Advisory" + ] + }, + { + "url": "https://github.com/zhizhuoshuma/cve_info_data/blob/ccaed4b94ba762eb8a8e003bfa762a7754b8182e/Vuln/Vuln/DIR-820L/command_execution_0/README.md", + "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ] }, - { - "url": "https://github.com/zhizhuoshuma/cve_info_data/blob/ccaed4b94ba762eb8a8e003bfa762a7754b8182e/Vuln/Vuln/DIR-820L/command_execution_0/README.md", - "source": "cve@mitre.org" - }, { "url": "https://www.dlink.com/en/security-bulletin/", "source": "cve@mitre.org", "tags": [ + "Not Applicable", "Vendor Advisory" ] } diff --git a/CVE-2022/CVE-2022-269xx/CVE-2022-26923.json b/CVE-2022/CVE-2022-269xx/CVE-2022-26923.json index da1e1b4c984..dcd856b09f0 100644 --- a/CVE-2022/CVE-2022-269xx/CVE-2022-26923.json +++ b/CVE-2022/CVE-2022-269xx/CVE-2022-26923.json @@ -2,8 +2,9 @@ "id": "CVE-2022-26923", "sourceIdentifier": "secure@microsoft.com", "published": "2022-05-10T21:15:10.133", - "lastModified": "2023-12-21T00:15:12.770", - "vulnStatus": "Modified", + "lastModified": "2024-06-28T14:08:58.920", + "vulnStatus": "Analyzed", + "cveTags": [], "cisaExploitAdd": "2022-08-18", "cisaActionDue": "2022-09-08", "cisaRequiredAction": "Apply updates per vendor instructions.", @@ -88,118 +89,61 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x64:*", - "matchCriteriaId": "084984D5-D241-497B-B118-50C6C1EAD468" + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.10240.19297", + "matchCriteriaId": "F2757D84-6B95-4B5C-9FF7-0B0D4CBD7B40" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x86:*", - "matchCriteriaId": "BA592626-F17C-4F46-823B-0947D102BBD2" + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.5850", + "matchCriteriaId": "D3845BA8-1885-4B32-A069-9CD95E9895A6" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:arm64:*", - "matchCriteriaId": "610B33F9-0309-4CF7-B7E4-5152D9B2FFE4" + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.4252", + "matchCriteriaId": "CC646C31-F80E-4BED-B15F-671250530066" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:x64:*", - "matchCriteriaId": "21074553-EDF2-468D-8E79-C39851B5BC79" + "criteria": "cpe:2.3:o:microsoft:windows_10_1909:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.18363.2274", + "matchCriteriaId": "D85D55B3-B0C8-402A-A6A3-E8E0F0465B72" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:x86:*", - "matchCriteriaId": "4E62F9CB-D1B6-4B4D-BCCD-7F4D36A73B4D" + "criteria": "cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19042.1706", + "matchCriteriaId": "2DD19ACE-EDC0-42FE-8F1A-4BD869BCEF27" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:arm64:*", - "matchCriteriaId": "49A4BBDA-0389-4171-AA49-6837F7DF4454" + "criteria": "cpe:2.3:o:microsoft:windows_10_21h1:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19043.1706", + "matchCriteriaId": "876220BB-7040-4EEA-AB26-2FC43ADE08C0" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:x64:*", - "matchCriteriaId": "F8C238FA-B20F-40A5-B861-A8295858F4BE" + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19044.1706", + "matchCriteriaId": "93FF0E05-D7EE-425E-9C5F-2D0AB8C98130" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:x86:*", - "matchCriteriaId": "56513BCA-A9F5-4112-BDE6-77E9B8D2677E" + "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22000.1817", + "matchCriteriaId": "672CF584-309F-4F28-9E3A-545C0138F5EA" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:arm64:*", - "matchCriteriaId": "665EA912-D724-41EB-86A9-24EB4FE87B54" + "criteria": "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E93068DB-549B-45AB-8E5C-00EB5D8B5CF8" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:x64:*", - "matchCriteriaId": "77E07B96-EAAA-4DD6-9172-0DE98A36726F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:x86:*", - "matchCriteriaId": "B846A736-E77C-4665-B28B-4E511880D575" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:x64:*", - "matchCriteriaId": "897A48D7-FCA1-4560-AFBB-718AF19BA3A2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:x86:*", - "matchCriteriaId": "507EB48C-F479-424C-8ABA-C279AB4FE3F4" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:arm64:*", - "matchCriteriaId": "925B8C67-C96F-4A4D-9BE7-CCCD78EF3C31" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:x64:*", - "matchCriteriaId": "6CF580BA-6938-40F6-9D86-F43044A6BACA" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:x86:*", - "matchCriteriaId": "C5E038AA-514F-48AC-B45E-859EE32525B4" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:arm64:*", - "matchCriteriaId": "31622391-A67E-4E2A-A855-1316B6E38630" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:x64:*", - "matchCriteriaId": "61F0792D-7587-4297-8EE7-D4DC3A30EE84" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:x86:*", - "matchCriteriaId": "7649042B-4430-4BD9-B82F-984A2831A651" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:arm64:*", - "matchCriteriaId": "B9F64296-66BF-4F1D-A11C-0C44C347E2AC" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:x64:*", - "matchCriteriaId": "5D7F7DDB-440E-42CD-82F4-B2C13F3CC462" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:x64:*", - "matchCriteriaId": "C936FD4F-959C-43B8-9917-E2A0DF4A8793" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:x86:*", - "matchCriteriaId": "DF8ABB14-84CF-4BBC-99C9-DA6C0F7A0619" + "criteria": "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C6CE5198-C498-4672-AF4C-77AB4BE06C5C" }, { "vulnerable": true, @@ -208,18 +152,21 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", - "matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7" + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.5850", + "matchCriteriaId": "0D5B4F63-0214-4593-A795-430B80CAC103" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", - "matchCriteriaId": "DB79EE26-FC32-417D-A49C-A1A63165A968" + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.4252", + "matchCriteriaId": "4742CDDB-5902-49BB-AB32-2A26A9C8EBDE" }, { "vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", - "matchCriteriaId": "1F0241B0-855A-489C-9AAE-68BC2556F24D" + "versionEndExcluding": "10.0.20348.1668", + "matchCriteriaId": "AA79ABC2-EF1B-4ACC-AD5D-D7937CC449F3" } ] } diff --git a/CVE-2022/CVE-2022-269xx/CVE-2022-26925.json b/CVE-2022/CVE-2022-269xx/CVE-2022-26925.json index 8740d08ebb6..500ecc8c9d9 100644 --- a/CVE-2022/CVE-2022-269xx/CVE-2022-26925.json +++ b/CVE-2022/CVE-2022-269xx/CVE-2022-26925.json @@ -2,8 +2,9 @@ "id": "CVE-2022-26925", "sourceIdentifier": "secure@microsoft.com", "published": "2022-05-10T21:15:10.187", - "lastModified": "2023-12-21T00:15:12.883", - "vulnStatus": "Modified", + "lastModified": "2024-06-28T14:13:24.527", + "vulnStatus": "Analyzed", + "cveTags": [], "cisaExploitAdd": "2022-07-01", "cisaActionDue": "2022-07-22", "cisaRequiredAction": "Apply remediation actions outlined in CISA guidance [https://www.cisa.gov/guidance-applying-june-microsoft-patch].", @@ -108,128 +109,61 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x64:*", - "matchCriteriaId": "084984D5-D241-497B-B118-50C6C1EAD468" + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.10240.19297", + "matchCriteriaId": "F2757D84-6B95-4B5C-9FF7-0B0D4CBD7B40" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x86:*", - "matchCriteriaId": "BA592626-F17C-4F46-823B-0947D102BBD2" + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.5125", + "matchCriteriaId": "2EE7ED9A-4E17-4ADB-9845-C10BEF403DD2" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:arm64:*", - "matchCriteriaId": "610B33F9-0309-4CF7-B7E4-5152D9B2FFE4" + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.2928", + "matchCriteriaId": "4E92CB6A-8CC1-4546-8717-6762B9DF3E5B" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:x64:*", - "matchCriteriaId": "21074553-EDF2-468D-8E79-C39851B5BC79" + "criteria": "cpe:2.3:o:microsoft:windows_10_1909:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.18363.2274", + "matchCriteriaId": "D85D55B3-B0C8-402A-A6A3-E8E0F0465B72" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:x86:*", - "matchCriteriaId": "4E62F9CB-D1B6-4B4D-BCCD-7F4D36A73B4D" + "criteria": "cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19042.1706", + "matchCriteriaId": "2DD19ACE-EDC0-42FE-8F1A-4BD869BCEF27" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:arm64:*", - "matchCriteriaId": "49A4BBDA-0389-4171-AA49-6837F7DF4454" + "criteria": "cpe:2.3:o:microsoft:windows_10_21h1:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19043.1706", + "matchCriteriaId": "876220BB-7040-4EEA-AB26-2FC43ADE08C0" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:x64:*", - "matchCriteriaId": "F8C238FA-B20F-40A5-B861-A8295858F4BE" + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19044.1706", + "matchCriteriaId": "93FF0E05-D7EE-425E-9C5F-2D0AB8C98130" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:x86:*", - "matchCriteriaId": "56513BCA-A9F5-4112-BDE6-77E9B8D2677E" + "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22000.675", + "matchCriteriaId": "98235A5F-1201-4367-9D6E-D30168667712" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:arm64:*", - "matchCriteriaId": "665EA912-D724-41EB-86A9-24EB4FE87B54" + "criteria": "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*", + "matchCriteriaId": "C2B1C231-DE19-4B8F-A4AA-5B3A65276E46" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:x64:*", - "matchCriteriaId": "77E07B96-EAAA-4DD6-9172-0DE98A36726F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:x86:*", - "matchCriteriaId": "B846A736-E77C-4665-B28B-4E511880D575" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:x64:*", - "matchCriteriaId": "897A48D7-FCA1-4560-AFBB-718AF19BA3A2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:x86:*", - "matchCriteriaId": "507EB48C-F479-424C-8ABA-C279AB4FE3F4" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:arm64:*", - "matchCriteriaId": "925B8C67-C96F-4A4D-9BE7-CCCD78EF3C31" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:x64:*", - "matchCriteriaId": "6CF580BA-6938-40F6-9D86-F43044A6BACA" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:x86:*", - "matchCriteriaId": "C5E038AA-514F-48AC-B45E-859EE32525B4" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:arm64:*", - "matchCriteriaId": "31622391-A67E-4E2A-A855-1316B6E38630" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:x64:*", - "matchCriteriaId": "61F0792D-7587-4297-8EE7-D4DC3A30EE84" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:x86:*", - "matchCriteriaId": "7649042B-4430-4BD9-B82F-984A2831A651" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:arm64:*", - "matchCriteriaId": "B9F64296-66BF-4F1D-A11C-0C44C347E2AC" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:x64:*", - "matchCriteriaId": "5D7F7DDB-440E-42CD-82F4-B2C13F3CC462" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:x64:*", - "matchCriteriaId": "7FE8B00B-4F39-4755-A323-8AD71F5E3EBE" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:x86:*", - "matchCriteriaId": "06BBFA69-94E2-4BAB-AFD3-BC434B11D106" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:x64:*", - "matchCriteriaId": "C936FD4F-959C-43B8-9917-E2A0DF4A8793" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:x86:*", - "matchCriteriaId": "DF8ABB14-84CF-4BBC-99C9-DA6C0F7A0619" + "criteria": "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E93068DB-549B-45AB-8E5C-00EB5D8B5CF8" }, { "vulnerable": true, @@ -238,29 +172,14 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_server:2022:*:*:*:*:*:*:*", - "matchCriteriaId": "BE257836-4F4D-4352-8293-B9CAD34F8794" + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", + "matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C" }, { "vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", "matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x86:*", - "matchCriteriaId": "EDCDBC70-9AB7-47F3-BD61-28860EEE5065" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_server_2008:sp2:*:*:*:*:*:x64:*", - "matchCriteriaId": "C0DC57FA-88F8-4D5C-94BD-3A8B1FB8C047" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_server_2008:sp2:*:*:*:*:*:x86:*", - "matchCriteriaId": "B4809FDE-A816-42FD-807F-4F9C7B6DB22E" - }, { "vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", @@ -273,13 +192,27 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", - "matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7" + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.5125", + "matchCriteriaId": "43A6B083-E960-433E-B9F8-DB4D379797C6" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", - "matchCriteriaId": "DB79EE26-FC32-417D-A49C-A1A63165A968" + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.2928", + "matchCriteriaId": "9F31A2C9-1CFB-4C3F-BAC3-2A0E095F2B28" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.20348.707", + "matchCriteriaId": "7466852F-89C9-4EA1-983F-D47205348CFA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_20h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19042.1706", + "matchCriteriaId": "BEEDF869-FD0F-4D9D-ADC9-D8DE94F95901" } ] } diff --git a/CVE-2022/CVE-2022-275xx/CVE-2022-27518.json b/CVE-2022/CVE-2022-275xx/CVE-2022-27518.json index 8b57b44e95c..771b921fd8f 100644 --- a/CVE-2022/CVE-2022-275xx/CVE-2022-27518.json +++ b/CVE-2022/CVE-2022-275xx/CVE-2022-27518.json @@ -2,8 +2,9 @@ "id": "CVE-2022-27518", "sourceIdentifier": "secure@citrix.com", "published": "2022-12-13T17:15:14.350", - "lastModified": "2023-10-18T18:15:08.927", - "vulnStatus": "Modified", + "lastModified": "2024-06-28T13:48:51.990", + "vulnStatus": "Analyzed", + "cveTags": [], "cisaExploitAdd": "2022-12-13", "cisaActionDue": "2023-01-03", "cisaRequiredAction": "Apply updates per vendor instructions.", @@ -138,17 +139,6 @@ { "operator": "AND", "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": false, - "criteria": "cpe:2.3:h:citrix:gateway:-:*:*:*:*:*:*:*", - "matchCriteriaId": "3EF98B43-71DB-4230-B7AC-76EC2B1F0533" - } - ] - }, { "operator": "OR", "negate": false, @@ -168,6 +158,17 @@ "matchCriteriaId": "FD9F0308-2BD3-403F-B90E-EEB1B6845627" } ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:citrix:gateway:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3EF98B43-71DB-4230-B7AC-76EC2B1F0533" + } + ] } ] } diff --git a/CVE-2022/CVE-2022-28xx/CVE-2022-2856.json b/CVE-2022/CVE-2022-28xx/CVE-2022-2856.json index 284a44ad468..f1790e8c51e 100644 --- a/CVE-2022/CVE-2022-28xx/CVE-2022-2856.json +++ b/CVE-2022/CVE-2022-28xx/CVE-2022-2856.json @@ -2,8 +2,9 @@ "id": "CVE-2022-2856", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2022-09-26T16:15:11.207", - "lastModified": "2024-02-15T02:00:01.650", - "vulnStatus": "Modified", + "lastModified": "2024-06-28T14:12:35.147", + "vulnStatus": "Analyzed", + "cveTags": [], "cisaExploitAdd": "2022-08-18", "cisaActionDue": "2022-09-08", "cisaRequiredAction": "Apply updates per vendor instructions.", @@ -63,9 +64,10 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*", - "matchCriteriaId": "F8B9FEC8-73B6-43B8-B24E-1F7C20D91D26" + "vulnerable": true, + "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", + "versionEndExcluding": "104.0.5112.101", + "matchCriteriaId": "E7C72EBC-6FE9-4A2D-BEF3-91F5E5ED020A" } ] }, @@ -74,10 +76,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", - "versionEndExcluding": "104.0.5112.101", - "matchCriteriaId": "E7C72EBC-6FE9-4A2D-BEF3-91F5E5ED020A" + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", + "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E" } ] } @@ -97,6 +98,34 @@ ] } ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", + "versionEndExcluding": "104.0.5112.102", + "matchCriteriaId": "EB0FE056-8166-4C5C-A267-1C0A039ADE02" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] } ], "references": [ @@ -113,13 +142,16 @@ "url": "https://crbug.com/1345630", "source": "chrome-cve-admin@google.com", "tags": [ - "Permissions Required", + "Exploit", "Vendor Advisory" ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4NMJURTG5RO3TGD7ZMIQ6Z4ZZ3SAVYE/", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Broken Link" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-301xx/CVE-2022-30190.json b/CVE-2022/CVE-2022-301xx/CVE-2022-30190.json index 8665781609b..520f386517c 100644 --- a/CVE-2022/CVE-2022-301xx/CVE-2022-30190.json +++ b/CVE-2022/CVE-2022-301xx/CVE-2022-30190.json @@ -2,8 +2,9 @@ "id": "CVE-2022-30190", "sourceIdentifier": "secure@microsoft.com", "published": "2022-06-01T20:15:07.983", - "lastModified": "2024-05-28T21:15:32.903", - "vulnStatus": "Modified", + "lastModified": "2024-06-28T14:14:37.327", + "vulnStatus": "Analyzed", + "cveTags": [], "cisaExploitAdd": "2022-06-14", "cisaActionDue": "2022-07-05", "cisaRequiredAction": "Apply updates per vendor instructions.", @@ -108,43 +109,45 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", - "matchCriteriaId": "21540673-614A-4D40-8BD7-3F07723803B0" + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.10240.19325", + "matchCriteriaId": "02873AEA-192B-438E-B031-E1CD2B347591" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*", - "matchCriteriaId": "9E2C378B-1507-4C81-82F6-9F599616845A" + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.5192", + "matchCriteriaId": "E0A979E1-6AE8-40FF-8CE3-3038E86171C2" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:*:*", - "matchCriteriaId": "FAE4278F-71A7-43E9-8F79-1CBFAE71D730" + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.3046", + "matchCriteriaId": "FEA6744F-2F3F-473A-A0B3-384F06931605" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:*:*", - "matchCriteriaId": "71E65CB9-6DC2-4A90-8C6A-103BEDC99823" + "criteria": "cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19042.1766", + "matchCriteriaId": "902AE9DE-AA38-4735-952C-E35905461CD8" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", - "matchCriteriaId": "E01A4CCA-4C43-46E0-90E6-3E4DBFBACD64" + "criteria": "cpe:2.3:o:microsoft:windows_10_21h1:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19043.1766", + "matchCriteriaId": "FEBD9568-4239-413E-99C4-B3D48B894E0E" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", - "matchCriteriaId": "6B8F3DD2-A145-4AF1-8545-CC42892DA3D1" + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19044.1766", + "matchCriteriaId": "EBEE2CE4-AE35-45D2-BC4A-6621D32D498A" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:arm64:*", - "matchCriteriaId": "B9F64296-66BF-4F1D-A11C-0C44C347E2AC" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:x64:*", - "matchCriteriaId": "5D7F7DDB-440E-42CD-82F4-B2C13F3CC462" + "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22000.739", + "matchCriteriaId": "D61E2300-8661-4027-8A97-A40EB215D3D9" }, { "vulnerable": true, @@ -183,18 +186,27 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", - "matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7" + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.5192", + "matchCriteriaId": "AD708026-6240-46AB-9372-38403EEEA749" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", - "matchCriteriaId": "DB79EE26-FC32-417D-A49C-A1A63165A968" + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.3046", + "matchCriteriaId": "E58B9A50-4740-4B8C-AE89-E06A73BACA7F" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*", - "matchCriteriaId": "821614DD-37DD-44E2-A8A4-FE8D23A33C3C" + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.20348.770", + "matchCriteriaId": "1673AC8E-C2ED-482F-A877-675EE512E7FA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_20h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19042.1766", + "matchCriteriaId": "58E9D59E-9144-418A-8EDA-2D6F7B544A01" } ] } @@ -204,7 +216,12 @@ "references": [ { "url": "http://packetstormsecurity.com/files/167438/Microsoft-Office-Word-MSDTJS-Code-Execution.html", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30190", diff --git a/CVE-2022/CVE-2022-303xx/CVE-2022-30333.json b/CVE-2022/CVE-2022-303xx/CVE-2022-30333.json index ea4196c8e3f..7fa705df537 100644 --- a/CVE-2022/CVE-2022-303xx/CVE-2022-30333.json +++ b/CVE-2022/CVE-2022-303xx/CVE-2022-30333.json @@ -2,8 +2,9 @@ "id": "CVE-2022-30333", "sourceIdentifier": "cve@mitre.org", "published": "2022-05-09T08:15:06.937", - "lastModified": "2023-09-17T07:15:08.007", - "vulnStatus": "Modified", + "lastModified": "2024-06-28T14:12:45.617", + "vulnStatus": "Analyzed", + "cveTags": [], "cisaExploitAdd": "2022-08-09", "cisaActionDue": "2022-08-30", "cisaRequiredAction": "Apply updates per vendor instructions.", @@ -101,8 +102,8 @@ "cpeMatch": [ { "vulnerable": false, - "criteria": "cpe:2.3:a:linux:linux_kernel:-:*:*:*:*:*:*:*", - "matchCriteriaId": "8BA79AC0-A0CC-4EE6-AEF5-9B8C8EA2C9F1" + "criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", + "matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1" }, { "vulnerable": false, @@ -112,6 +113,21 @@ ] } ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", + "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73" + } + ] + } + ] } ], "references": [ @@ -134,18 +150,24 @@ }, { "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00022.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://security.gentoo.org/glsa/202309-04", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.rarlab.com/rar/rarlinux-x32-612.tar.gz", "source": "cve@mitre.org", "tags": [ - "Patch", - "Vendor Advisory" + "Patch" ] }, { diff --git a/CVE-2022/CVE-2022-30xx/CVE-2022-3038.json b/CVE-2022/CVE-2022-30xx/CVE-2022-3038.json index c7fb0d0ad6c..19c1dc51063 100644 --- a/CVE-2022/CVE-2022-30xx/CVE-2022-3038.json +++ b/CVE-2022/CVE-2022-30xx/CVE-2022-3038.json @@ -2,8 +2,9 @@ "id": "CVE-2022-3038", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2022-09-26T16:15:11.793", - "lastModified": "2024-02-15T02:00:01.650", - "vulnStatus": "Modified", + "lastModified": "2024-06-28T13:40:50.297", + "vulnStatus": "Analyzed", + "cveTags": [], "cisaExploitAdd": "2023-03-30", "cisaActionDue": "2023-04-20", "cisaRequiredAction": "Apply updates per vendor instructions.", @@ -92,7 +93,8 @@ "url": "http://packetstormsecurity.com/files/168596/Google-Chrome-103.0.5060.53-network-URLLoader-NotifyCompleted-Heap-Use-After-Free.html", "source": "chrome-cve-admin@google.com", "tags": [ - "Third Party Advisory" + "Third Party Advisory", + "VDB Entry" ] }, { @@ -107,13 +109,17 @@ "url": "https://crbug.com/1340253", "source": "chrome-cve-admin@google.com", "tags": [ - "Permissions Required", + "Exploit", "Vendor Advisory" ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4NMJURTG5RO3TGD7ZMIQ6Z4ZZ3SAVYE/", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Mailing List", + "Release Notes" + ] }, { "url": "https://security.gentoo.org/glsa/202209-23", diff --git a/CVE-2022/CVE-2022-30xx/CVE-2022-3075.json b/CVE-2022/CVE-2022-30xx/CVE-2022-3075.json index 265e9540366..aa88b47276e 100644 --- a/CVE-2022/CVE-2022-30xx/CVE-2022-3075.json +++ b/CVE-2022/CVE-2022-30xx/CVE-2022-3075.json @@ -2,8 +2,9 @@ "id": "CVE-2022-3075", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2022-09-26T16:15:13.463", - "lastModified": "2024-02-15T02:00:01.650", - "vulnStatus": "Modified", + "lastModified": "2024-06-28T14:05:18.150", + "vulnStatus": "Analyzed", + "cveTags": [], "cisaExploitAdd": "2022-09-08", "cisaActionDue": "2022-09-29", "cisaRequiredAction": "Apply updates per vendor instructions.", @@ -105,7 +106,10 @@ }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4NMJURTG5RO3TGD7ZMIQ6Z4ZZ3SAVYE/", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://security.gentoo.org/glsa/202209-23", diff --git a/CVE-2022/CVE-2022-328xx/CVE-2022-32893.json b/CVE-2022/CVE-2022-328xx/CVE-2022-32893.json index d27ec1142e4..661057d8abb 100644 --- a/CVE-2022/CVE-2022-328xx/CVE-2022-32893.json +++ b/CVE-2022/CVE-2022-328xx/CVE-2022-32893.json @@ -2,8 +2,9 @@ "id": "CVE-2022-32893", "sourceIdentifier": "product-security@apple.com", "published": "2022-08-24T20:15:09.147", - "lastModified": "2023-11-07T03:48:15.340", - "vulnStatus": "Modified", + "lastModified": "2024-06-28T14:09:26.977", + "vulnStatus": "Analyzed", + "cveTags": [], "cisaExploitAdd": "2022-08-18", "cisaActionDue": "2022-09-08", "cisaRequiredAction": "Apply updates per vendor instructions.", @@ -222,16 +223,23 @@ "url": "https://lists.debian.org/debian-lts-announce/2022/08/msg00019.html", "source": "product-security@apple.com", "tags": [ + "Mailing List", "Third Party Advisory" ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7SETAAXEPGNBMYKTUDFEZHS5LGSQ64QL/", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YKJGV2EXVMYQW3OAJNI4WUTKKVMD2YYK/", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://security.gentoo.org/glsa/202208-39", @@ -265,6 +273,7 @@ "url": "https://www.debian.org/security/2022/dsa-5219", "source": "product-security@apple.com", "tags": [ + "Mailing List", "Third Party Advisory" ] }, @@ -272,6 +281,7 @@ "url": "https://www.debian.org/security/2022/dsa-5220", "source": "product-security@apple.com", "tags": [ + "Mailing List", "Third Party Advisory" ] } diff --git a/CVE-2022/CVE-2022-347xx/CVE-2022-34713.json b/CVE-2022/CVE-2022-347xx/CVE-2022-34713.json index 3ca8d197820..98241358ec8 100644 --- a/CVE-2022/CVE-2022-347xx/CVE-2022-34713.json +++ b/CVE-2022/CVE-2022-347xx/CVE-2022-34713.json @@ -2,8 +2,9 @@ "id": "CVE-2022-34713", "sourceIdentifier": "secure@microsoft.com", "published": "2022-08-09T20:15:11.487", - "lastModified": "2023-05-31T19:15:15.797", - "vulnStatus": "Modified", + "lastModified": "2024-06-28T14:13:04.940", + "vulnStatus": "Analyzed", + "cveTags": [], "cisaExploitAdd": "2022-08-09", "cisaActionDue": "2022-08-30", "cisaRequiredAction": "Apply updates per vendor instructions.", @@ -63,93 +64,45 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x64:*", - "matchCriteriaId": "084984D5-D241-497B-B118-50C6C1EAD468" + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.10240.19387", + "matchCriteriaId": "277405AA-FD3E-4D9C-A517-699DACC4C73A" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x86:*", - "matchCriteriaId": "BA592626-F17C-4F46-823B-0947D102BBD2" + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.5291", + "matchCriteriaId": "CA14A226-5C8E-47C6-A01B-59696B55E725" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:arm64:*", - "matchCriteriaId": "610B33F9-0309-4CF7-B7E4-5152D9B2FFE4" + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.3287", + "matchCriteriaId": "E10FB53B-BB2F-4EE5-B8CA-3C382A844EA5" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:x64:*", - "matchCriteriaId": "21074553-EDF2-468D-8E79-C39851B5BC79" + "criteria": "cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19042.1889", + "matchCriteriaId": "85213B81-17AA-49D6-9CCD-FF760D4DA598" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:x86:*", - "matchCriteriaId": "4E62F9CB-D1B6-4B4D-BCCD-7F4D36A73B4D" + "criteria": "cpe:2.3:o:microsoft:windows_10_21h1:*:*:*:*:*:*:arm64:*", + "versionEndExcluding": "10.0.19043.1889", + "matchCriteriaId": "CB0CF625-97ED-4985-AA28-9D3110AD9CFB" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:arm64:*", - "matchCriteriaId": "49A4BBDA-0389-4171-AA49-6837F7DF4454" + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19044.1889", + "matchCriteriaId": "4F8DCD6B-C358-48DE-B39C-99432DD427E3" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:x64:*", - "matchCriteriaId": "F8C238FA-B20F-40A5-B861-A8295858F4BE" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:x86:*", - "matchCriteriaId": "56513BCA-A9F5-4112-BDE6-77E9B8D2677E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:arm64:*", - "matchCriteriaId": "665EA912-D724-41EB-86A9-24EB4FE87B54" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:x64:*", - "matchCriteriaId": "77E07B96-EAAA-4DD6-9172-0DE98A36726F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:x86:*", - "matchCriteriaId": "B846A736-E77C-4665-B28B-4E511880D575" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:x64:*", - "matchCriteriaId": "897A48D7-FCA1-4560-AFBB-718AF19BA3A2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:x86:*", - "matchCriteriaId": "507EB48C-F479-424C-8ABA-C279AB4FE3F4" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:arm64:*", - "matchCriteriaId": "925B8C67-C96F-4A4D-9BE7-CCCD78EF3C31" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:x64:*", - "matchCriteriaId": "6CF580BA-6938-40F6-9D86-F43044A6BACA" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:x86:*", - "matchCriteriaId": "C5E038AA-514F-48AC-B45E-859EE32525B4" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:arm64:*", - "matchCriteriaId": "B9F64296-66BF-4F1D-A11C-0C44C347E2AC" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:x64:*", - "matchCriteriaId": "5D7F7DDB-440E-42CD-82F4-B2C13F3CC462" + "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22000.856", + "matchCriteriaId": "AEAAF664-B70D-4228-B962-5D0AD81DD066" }, { "vulnerable": true, @@ -193,23 +146,27 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", - "matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7" + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.5291", + "matchCriteriaId": "1839B33E-0EC7-4B78-8D34-0EAC2F934B82" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*", - "matchCriteriaId": "4A190388-AA82-4504-9D5A-624F23268C9F" + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.3287", + "matchCriteriaId": "898EEB05-FF57-4D96-B745-B3EF23CCFCC3" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", - "matchCriteriaId": "DB79EE26-FC32-417D-A49C-A1A63165A968" + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.20348.887", + "matchCriteriaId": "F780FD60-3B7C-4590-95F5-A66FECCE3157" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*", - "matchCriteriaId": "821614DD-37DD-44E2-A8A4-FE8D23A33C3C" + "criteria": "cpe:2.3:o:microsoft:windows_server_20h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19042.1889", + "matchCriteriaId": "7FA7AAE5-2F90-4C7D-9607-0DFC65F52260" } ] } @@ -219,7 +176,11 @@ "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34713", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-368xx/CVE-2022-36804.json b/CVE-2022/CVE-2022-368xx/CVE-2022-36804.json index c3db23751f2..fc05a49e36b 100644 --- a/CVE-2022/CVE-2022-368xx/CVE-2022-36804.json +++ b/CVE-2022/CVE-2022-368xx/CVE-2022-36804.json @@ -2,8 +2,9 @@ "id": "CVE-2022-36804", "sourceIdentifier": "security@atlassian.com", "published": "2022-08-25T06:15:09.077", - "lastModified": "2023-08-08T14:22:24.967", - "vulnStatus": "Modified", + "lastModified": "2024-06-28T13:57:13.930", + "vulnStatus": "Analyzed", + "cveTags": [], "cisaExploitAdd": "2022-09-30", "cisaActionDue": "2022-10-21", "cisaRequiredAction": "Apply updates per vendor instructions.", @@ -125,7 +126,12 @@ }, { "url": "http://packetstormsecurity.com/files/171453/Bitbucket-7.0.0-Remote-Command-Execution.html", - "source": "security@atlassian.com" + "source": "security@atlassian.com", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://jira.atlassian.com/browse/BSERV-13438", diff --git a/CVE-2022/CVE-2022-379xx/CVE-2022-37969.json b/CVE-2022/CVE-2022-379xx/CVE-2022-37969.json index 56fedc6544e..2a33e2d28c3 100644 --- a/CVE-2022/CVE-2022-379xx/CVE-2022-37969.json +++ b/CVE-2022/CVE-2022-379xx/CVE-2022-37969.json @@ -2,8 +2,9 @@ "id": "CVE-2022-37969", "sourceIdentifier": "secure@microsoft.com", "published": "2022-09-13T19:15:12.323", - "lastModified": "2023-08-08T14:21:49.707", - "vulnStatus": "Modified", + "lastModified": "2024-06-28T14:02:20.697", + "vulnStatus": "Analyzed", + "cveTags": [], "cisaExploitAdd": "2022-09-14", "cisaActionDue": "2022-10-05", "cisaRequiredAction": "Apply updates per vendor instructions.", @@ -63,128 +64,65 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x64:*", - "matchCriteriaId": "084984D5-D241-497B-B118-50C6C1EAD468" + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.10240.19444", + "matchCriteriaId": "FDCFAB75-EDBA-4DD1-ADFD-43B41B9AC551" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x86:*", - "matchCriteriaId": "BA592626-F17C-4F46-823B-0947D102BBD2" + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.5356", + "matchCriteriaId": "DA477E30-004E-44A8-9779-2178B0C83A8B" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:arm64:*", - "matchCriteriaId": "610B33F9-0309-4CF7-B7E4-5152D9B2FFE4" + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.3406", + "matchCriteriaId": "613CF99B-8047-471C-8B9C-74650CDA994E" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:x64:*", - "matchCriteriaId": "21074553-EDF2-468D-8E79-C39851B5BC79" + "criteria": "cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19042.2006", + "matchCriteriaId": "ACC3EE8D-9114-4357-94A4-049423AEE19B" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:x86:*", - "matchCriteriaId": "4E62F9CB-D1B6-4B4D-BCCD-7F4D36A73B4D" + "criteria": "cpe:2.3:o:microsoft:windows_10_21h1:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19043.2006", + "matchCriteriaId": "F4FFEED6-AE8E-4C36-8CA5-83FF8F4EB079" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:arm64:*", - "matchCriteriaId": "49A4BBDA-0389-4171-AA49-6837F7DF4454" + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19044.2006", + "matchCriteriaId": "C7C86CAC-7AAD-4555-A64D-F0574D6776D4" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:x64:*", - "matchCriteriaId": "F8C238FA-B20F-40A5-B861-A8295858F4BE" + "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22000.978", + "matchCriteriaId": "4C29A821-C065-4CC7-BE95-A7D441AD6ADB" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:x86:*", - "matchCriteriaId": "56513BCA-A9F5-4112-BDE6-77E9B8D2677E" + "criteria": "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*", + "matchCriteriaId": "C2B1C231-DE19-4B8F-A4AA-5B3A65276E46" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:arm64:*", - "matchCriteriaId": "665EA912-D724-41EB-86A9-24EB4FE87B54" + "criteria": "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E93068DB-549B-45AB-8E5C-00EB5D8B5CF8" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:x64:*", - "matchCriteriaId": "77E07B96-EAAA-4DD6-9172-0DE98A36726F" + "criteria": "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C6CE5198-C498-4672-AF4C-77AB4BE06C5C" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:x86:*", - "matchCriteriaId": "B846A736-E77C-4665-B28B-4E511880D575" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:x64:*", - "matchCriteriaId": "897A48D7-FCA1-4560-AFBB-718AF19BA3A2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:x86:*", - "matchCriteriaId": "507EB48C-F479-424C-8ABA-C279AB4FE3F4" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:arm64:*", - "matchCriteriaId": "925B8C67-C96F-4A4D-9BE7-CCCD78EF3C31" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:x64:*", - "matchCriteriaId": "6CF580BA-6938-40F6-9D86-F43044A6BACA" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:x86:*", - "matchCriteriaId": "C5E038AA-514F-48AC-B45E-859EE32525B4" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:arm64:*", - "matchCriteriaId": "B9F64296-66BF-4F1D-A11C-0C44C347E2AC" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:x64:*", - "matchCriteriaId": "5D7F7DDB-440E-42CD-82F4-B2C13F3CC462" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:x64:*", - "matchCriteriaId": "7FE8B00B-4F39-4755-A323-8AD71F5E3EBE" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:x86:*", - "matchCriteriaId": "06BBFA69-94E2-4BAB-AFD3-BC434B11D106" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:x64:*", - "matchCriteriaId": "C936FD4F-959C-43B8-9917-E2A0DF4A8793" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:x86:*", - "matchCriteriaId": "DF8ABB14-84CF-4BBC-99C9-DA6C0F7A0619" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:rt:*:*:*", - "matchCriteriaId": "D01999BB-2CD6-4C84-A518-3A3BB78F1105" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*", - "matchCriteriaId": "2127D10C-B6F3-4C1D-B9AA-5D78513CC996" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*", - "matchCriteriaId": "AB425562-C0A0-452E-AABE-F70522F15E1A" + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", + "matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C" }, { "vulnerable": true, @@ -203,23 +141,21 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", - "matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7" + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.5356", + "matchCriteriaId": "D1866C2D-F087-4933-AB81-6CC09EDDA613" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", - "matchCriteriaId": "DB79EE26-FC32-417D-A49C-A1A63165A968" + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.3406", + "matchCriteriaId": "28914F44-43CC-4B38-A979-86B4D75F29BA" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*", - "matchCriteriaId": "821614DD-37DD-44E2-A8A4-FE8D23A33C3C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:azure:*:*:*", - "matchCriteriaId": "036D57EB-3226-438A-B3E6-0D4698D7EDCD" + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.20348.1006", + "matchCriteriaId": "CEBE639C-BCC0-41FE-8CE7-E64876DA69E5" } ] } @@ -229,7 +165,11 @@ "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37969", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-37xx/CVE-2022-3723.json b/CVE-2022/CVE-2022-37xx/CVE-2022-3723.json index c6291fecf21..2affed7d7be 100644 --- a/CVE-2022/CVE-2022-37xx/CVE-2022-3723.json +++ b/CVE-2022/CVE-2022-37xx/CVE-2022-3723.json @@ -2,8 +2,9 @@ "id": "CVE-2022-3723", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2022-11-01T23:15:19.710", - "lastModified": "2023-05-03T12:16:26.557", - "vulnStatus": "Modified", + "lastModified": "2024-06-28T13:50:42.990", + "vulnStatus": "Analyzed", + "cveTags": [], "cisaExploitAdd": "2022-10-28", "cisaActionDue": "2022-11-18", "cisaRequiredAction": "Apply updates per vendor instructions.", @@ -85,14 +86,15 @@ "url": "https://crbug.com/1378239", "source": "chrome-cve-admin@google.com", "tags": [ - "Issue Tracking", - "Permissions Required", - "Vendor Advisory" + "Permissions Required" ] }, { "url": "https://security.gentoo.org/glsa/202305-10", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-381xx/CVE-2022-38181.json b/CVE-2022/CVE-2022-381xx/CVE-2022-38181.json index db666be48dc..c36a960d31a 100644 --- a/CVE-2022/CVE-2022-381xx/CVE-2022-38181.json +++ b/CVE-2022/CVE-2022-381xx/CVE-2022-38181.json @@ -2,8 +2,9 @@ "id": "CVE-2022-38181", "sourceIdentifier": "cve@mitre.org", "published": "2022-10-25T19:15:11.487", - "lastModified": "2023-12-13T13:51:52.563", - "vulnStatus": "Modified", + "lastModified": "2024-06-28T13:41:11.583", + "vulnStatus": "Analyzed", + "cveTags": [], "cisaExploitAdd": "2023-03-30", "cisaActionDue": "2023-04-20", "cisaRequiredAction": "Apply updates per vendor instructions.", @@ -100,7 +101,11 @@ "references": [ { "url": "http://packetstormsecurity.com/files/172854/Android-Arm-Mali-GPU-Arbitrary-Code-Execution.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://developer.arm.com/Arm%20Security%20Center/Mali%20GPU%20Driver%20Vulnerabilities", diff --git a/CVE-2022/CVE-2022-406xx/CVE-2022-40684.json b/CVE-2022/CVE-2022-406xx/CVE-2022-40684.json index 113e2e4a10b..c2f43274c56 100644 --- a/CVE-2022/CVE-2022-406xx/CVE-2022-40684.json +++ b/CVE-2022/CVE-2022-406xx/CVE-2022-40684.json @@ -2,8 +2,9 @@ "id": "CVE-2022-40684", "sourceIdentifier": "psirt@fortinet.com", "published": "2022-10-18T14:15:09.747", - "lastModified": "2023-08-08T14:22:24.967", - "vulnStatus": "Modified", + "lastModified": "2024-06-28T13:57:03.760", + "vulnStatus": "Analyzed", + "cveTags": [], "cisaExploitAdd": "2022-10-11", "cisaActionDue": "2022-11-01", "cisaRequiredAction": "Apply updates per vendor instructions.", @@ -128,12 +129,18 @@ "source": "psirt@fortinet.com", "tags": [ "Exploit", - "Third Party Advisory" + "Third Party Advisory", + "VDB Entry" ] }, { "url": "http://packetstormsecurity.com/files/171515/Fortinet-7.2.1-Authentication-Bypass.html", - "source": "psirt@fortinet.com" + "source": "psirt@fortinet.com", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://fortiguard.com/psirt/FG-IR-22-377", diff --git a/CVE-2022/CVE-2022-410xx/CVE-2022-41033.json b/CVE-2022/CVE-2022-410xx/CVE-2022-41033.json index 00db1e2c9c0..d024472cd99 100644 --- a/CVE-2022/CVE-2022-410xx/CVE-2022-41033.json +++ b/CVE-2022/CVE-2022-410xx/CVE-2022-41033.json @@ -2,8 +2,9 @@ "id": "CVE-2022-41033", "sourceIdentifier": "secure@microsoft.com", "published": "2022-10-11T19:15:20.567", - "lastModified": "2023-12-20T20:15:17.880", - "vulnStatus": "Modified", + "lastModified": "2024-06-28T13:56:53.827", + "vulnStatus": "Analyzed", + "cveTags": [], "cisaExploitAdd": "2022-10-11", "cisaActionDue": "2022-11-01", "cisaRequiredAction": "Apply updates per vendor instructions.", @@ -63,53 +64,51 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", - "matchCriteriaId": "21540673-614A-4D40-8BD7-3F07723803B0" + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.10240.19507", + "matchCriteriaId": "4107B4BA-0188-4838-8B98-D69D360AF1A7" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*", - "matchCriteriaId": "9E2C378B-1507-4C81-82F6-9F599616845A" + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.5427", + "matchCriteriaId": "E9E7D379-6A2F-4653-9F0A-3275F73CC976" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:*:*", - "matchCriteriaId": "FAE4278F-71A7-43E9-8F79-1CBFAE71D730" + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.3532", + "matchCriteriaId": "3781A245-9212-4015-A880-8792500DAF43" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:*:*", - "matchCriteriaId": "71E65CB9-6DC2-4A90-8C6A-103BEDC99823" + "criteria": "cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19042.2130", + "matchCriteriaId": "A835937F-DD39-47FE-8C2F-7B569FFE26A9" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", - "matchCriteriaId": "E01A4CCA-4C43-46E0-90E6-3E4DBFBACD64" + "criteria": "cpe:2.3:o:microsoft:windows_10_21h1:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19043.2130", + "matchCriteriaId": "165AC78C-9948-4AE2-9426-3179580B4EA6" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", - "matchCriteriaId": "6B8F3DD2-A145-4AF1-8545-CC42892DA3D1" + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19044.2130", + "matchCriteriaId": "FF014B8F-68BA-46BD-B741-4A904D432E87" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:arm64:*", - "matchCriteriaId": "B9F64296-66BF-4F1D-A11C-0C44C347E2AC" + "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22000.1098", + "matchCriteriaId": "316AEDB6-65AF-4F9F-9617-4197386D4182" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:x64:*", - "matchCriteriaId": "5D7F7DDB-440E-42CD-82F4-B2C13F3CC462" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_11:22h2:*:*:*:*:*:arm64:*", - "matchCriteriaId": "747ED159-1972-4310-AAD1-8E02AFB08826" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_11:22h2:*:*:*:*:*:x64:*", - "matchCriteriaId": "62B9100B-206D-4FD1-8D23-A355DCA37460" + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22621.674", + "matchCriteriaId": "9DEC0AE5-324C-4117-ADFD-D8425D01C575" }, { "vulnerable": true, @@ -148,18 +147,21 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", - "matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7" + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.5427", + "matchCriteriaId": "2EEAA2B6-8867-4C7D-95F3-B3EB1999AA14" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", - "matchCriteriaId": "DB79EE26-FC32-417D-A49C-A1A63165A968" + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.3532", + "matchCriteriaId": "80C80E91-7A5B-45AD-AD4D-F9899F92DB6C" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*", - "matchCriteriaId": "821614DD-37DD-44E2-A8A4-FE8D23A33C3C" + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.20348.1129", + "matchCriteriaId": "C8E84A9A-1B4C-4D3E-B1B3-96700DC43B09" } ] } diff --git a/CVE-2022/CVE-2022-410xx/CVE-2022-41040.json b/CVE-2022/CVE-2022-410xx/CVE-2022-41040.json index c4ad94030be..49cfe5d82e5 100644 --- a/CVE-2022/CVE-2022-410xx/CVE-2022-41040.json +++ b/CVE-2022/CVE-2022-410xx/CVE-2022-41040.json @@ -2,8 +2,9 @@ "id": "CVE-2022-41040", "sourceIdentifier": "secure@microsoft.com", "published": "2022-10-03T01:15:08.753", - "lastModified": "2023-12-20T20:15:18.393", - "vulnStatus": "Modified", + "lastModified": "2024-06-28T13:57:25.057", + "vulnStatus": "Analyzed", + "cveTags": [], "cisaExploitAdd": "2022-09-30", "cisaActionDue": "2022-10-21", "cisaRequiredAction": "Apply updates per vendor instructions.", @@ -120,7 +121,10 @@ }, { "url": "https://www.secpod.com/blog/microsoft-november-2022-patch-tuesday-patches-65-vulnerabilities-including-6-zero-days/", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-410xx/CVE-2022-41049.json b/CVE-2022/CVE-2022-410xx/CVE-2022-41049.json index a8935d09724..3dd0138233f 100644 --- a/CVE-2022/CVE-2022-410xx/CVE-2022-41049.json +++ b/CVE-2022/CVE-2022-410xx/CVE-2022-41049.json @@ -2,8 +2,9 @@ "id": "CVE-2022-41049", "sourceIdentifier": "secure@microsoft.com", "published": "2022-11-09T22:15:19.567", - "lastModified": "2023-08-08T14:21:49.707", - "vulnStatus": "Modified", + "lastModified": "2024-06-28T13:49:40.510", + "vulnStatus": "Analyzed", + "cveTags": [], "cisaExploitAdd": "2022-11-14", "cisaActionDue": "2022-12-09", "cisaRequiredAction": "Apply updates per vendor instructions.", @@ -49,7 +50,7 @@ "description": [ { "lang": "en", - "value": "CWE-269" + "value": "NVD-CWE-noinfo" } ] } @@ -63,98 +64,75 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", - "matchCriteriaId": "21540673-614A-4D40-8BD7-3F07723803B0" + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.10240.19567", + "matchCriteriaId": "D1B6D84B-3C19-443B-AC82-A2CBF2E91B85" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*", - "matchCriteriaId": "9E2C378B-1507-4C81-82F6-9F599616845A" + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.5501", + "matchCriteriaId": "C4E7A8EB-F231-4358-B2F0-86CE298DCB32" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:*:*", - "matchCriteriaId": "FAE4278F-71A7-43E9-8F79-1CBFAE71D730" + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.3650", + "matchCriteriaId": "FD13C1A3-0D55-44B4-BCDA-3FE16F3FD0BB" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:*:*", - "matchCriteriaId": "71E65CB9-6DC2-4A90-8C6A-103BEDC99823" + "criteria": "cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19042.2251", + "matchCriteriaId": "53D74F18-E886-4BDD-BF98-6E3E7FDB416A" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:22h2:*:*:*:*:*:*:*", - "matchCriteriaId": "9D5DE444-AEA8-4674-AC58-31FC1F12BB55" + "criteria": "cpe:2.3:o:microsoft:windows_10_21h1:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19043.2251", + "matchCriteriaId": "6CD19777-D4BC-4091-B5DF-196E3A5ECD41" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", - "matchCriteriaId": "E01A4CCA-4C43-46E0-90E6-3E4DBFBACD64" + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19044.2251", + "matchCriteriaId": "A22FD3BC-3283-49FD-89E7-120BD1BD5664" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", - "matchCriteriaId": "6B8F3DD2-A145-4AF1-8545-CC42892DA3D1" + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19045.2251", + "matchCriteriaId": "71F26E89-0870-4C4A-81FE-F9F793A9E706" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:x64:*", - "matchCriteriaId": "5D7F7DDB-440E-42CD-82F4-B2C13F3CC462" + "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22000.1219", + "matchCriteriaId": "701F768A-FE97-481C-87FE-53135E160DD8" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_11:22h2:*:*:*:*:*:x64:*", - "matchCriteriaId": "62B9100B-206D-4FD1-8D23-A355DCA37460" + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22621.819", + "matchCriteriaId": "633EBB51-1843-47BD-8CA2-7A51EAF71B44" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_7:sp1:*:*:*:*:*:*:*", - "matchCriteriaId": "84079754-7D44-439C-ADFC-C560945B6DF1" + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.5501", + "matchCriteriaId": "A5D182FC-6882-441A-994F-39721FD69EC2" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*", - "matchCriteriaId": "E93068DB-549B-45AB-8E5C-00EB5D8B5CF8" + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.3650", + "matchCriteriaId": "BD54B434-65C1-414E-9498-67E871281112" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:rt:*:*:*", - "matchCriteriaId": "D01999BB-2CD6-4C84-A518-3A3BB78F1105" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", - "matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", - "matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", - "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", - "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", - "matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", - "matchCriteriaId": "DB79EE26-FC32-417D-A49C-A1A63165A968" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*", - "matchCriteriaId": "821614DD-37DD-44E2-A8A4-FE8D23A33C3C" + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.20348.1249", + "matchCriteriaId": "9883B9FF-9A73-4FAE-83C1-27CD9346ABED" } ] } @@ -164,7 +142,11 @@ "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41049", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-410xx/CVE-2022-41073.json b/CVE-2022/CVE-2022-410xx/CVE-2022-41073.json index ca491fb3e99..8485e6969db 100644 --- a/CVE-2022/CVE-2022-410xx/CVE-2022-41073.json +++ b/CVE-2022/CVE-2022-410xx/CVE-2022-41073.json @@ -2,8 +2,9 @@ "id": "CVE-2022-41073", "sourceIdentifier": "secure@microsoft.com", "published": "2022-11-09T22:15:21.207", - "lastModified": "2023-09-06T21:15:08.197", - "vulnStatus": "Modified", + "lastModified": "2024-06-28T13:49:53.320", + "vulnStatus": "Analyzed", + "cveTags": [], "cisaExploitAdd": "2022-11-08", "cisaActionDue": "2022-12-09", "cisaRequiredAction": "Apply updates per vendor instructions.", @@ -63,58 +64,57 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", - "matchCriteriaId": "21540673-614A-4D40-8BD7-3F07723803B0" + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.10240.19567", + "matchCriteriaId": "D1B6D84B-3C19-443B-AC82-A2CBF2E91B85" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*", - "matchCriteriaId": "9E2C378B-1507-4C81-82F6-9F599616845A" + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.5501", + "matchCriteriaId": "C4E7A8EB-F231-4358-B2F0-86CE298DCB32" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:*:*", - "matchCriteriaId": "FAE4278F-71A7-43E9-8F79-1CBFAE71D730" + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.3650", + "matchCriteriaId": "FD13C1A3-0D55-44B4-BCDA-3FE16F3FD0BB" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:*:*", - "matchCriteriaId": "71E65CB9-6DC2-4A90-8C6A-103BEDC99823" + "criteria": "cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19042.2251", + "matchCriteriaId": "53D74F18-E886-4BDD-BF98-6E3E7FDB416A" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:22h2:*:*:*:*:*:*:*", - "matchCriteriaId": "9D5DE444-AEA8-4674-AC58-31FC1F12BB55" + "criteria": "cpe:2.3:o:microsoft:windows_10_21h1:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19043.2251", + "matchCriteriaId": "6CD19777-D4BC-4091-B5DF-196E3A5ECD41" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", - "matchCriteriaId": "E01A4CCA-4C43-46E0-90E6-3E4DBFBACD64" + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19044.2251", + "matchCriteriaId": "A22FD3BC-3283-49FD-89E7-120BD1BD5664" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", - "matchCriteriaId": "6B8F3DD2-A145-4AF1-8545-CC42892DA3D1" + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19045.2251", + "matchCriteriaId": "71F26E89-0870-4C4A-81FE-F9F793A9E706" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:arm64:*", - "matchCriteriaId": "B9F64296-66BF-4F1D-A11C-0C44C347E2AC" + "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22000.1219", + "matchCriteriaId": "701F768A-FE97-481C-87FE-53135E160DD8" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:x64:*", - "matchCriteriaId": "5D7F7DDB-440E-42CD-82F4-B2C13F3CC462" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_11:22h2:*:*:*:*:*:arm64:*", - "matchCriteriaId": "747ED159-1972-4310-AAD1-8E02AFB08826" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_11:22h2:*:*:*:*:*:x64:*", - "matchCriteriaId": "62B9100B-206D-4FD1-8D23-A355DCA37460" + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22621.819", + "matchCriteriaId": "633EBB51-1843-47BD-8CA2-7A51EAF71B44" }, { "vulnerable": true, @@ -153,23 +153,21 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", - "matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7" + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.5501", + "matchCriteriaId": "A5D182FC-6882-441A-994F-39721FD69EC2" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", - "matchCriteriaId": "DB79EE26-FC32-417D-A49C-A1A63165A968" + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.3650", + "matchCriteriaId": "BD54B434-65C1-414E-9498-67E871281112" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*", - "matchCriteriaId": "821614DD-37DD-44E2-A8A4-FE8D23A33C3C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:datacenter\\:_azure:*:*:*", - "matchCriteriaId": "8B84E4CE-34ED-435A-ADF7-9A8540DE7568" + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.20348.1249", + "matchCriteriaId": "9883B9FF-9A73-4FAE-83C1-27CD9346ABED" } ] } @@ -179,11 +177,19 @@ "references": [ { "url": "http://packetstormsecurity.com/files/174528/Microsoft-Windows-Privilege-Escalation.html", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41073", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-410xx/CVE-2022-41080.json b/CVE-2022/CVE-2022-410xx/CVE-2022-41080.json index b69a1e27346..2d9f90e55e0 100644 --- a/CVE-2022/CVE-2022-410xx/CVE-2022-41080.json +++ b/CVE-2022/CVE-2022-410xx/CVE-2022-41080.json @@ -2,8 +2,9 @@ "id": "CVE-2022-41080", "sourceIdentifier": "secure@microsoft.com", "published": "2022-11-09T22:15:21.550", - "lastModified": "2023-06-13T17:15:13.577", - "vulnStatus": "Modified", + "lastModified": "2024-06-28T13:45:34.750", + "vulnStatus": "Analyzed", + "cveTags": [], "cisaExploitAdd": "2023-01-10", "cisaActionDue": "2023-01-31", "cisaRequiredAction": "Apply updates per vendor instructions.", @@ -114,7 +115,11 @@ "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41080", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-410xx/CVE-2022-41082.json b/CVE-2022/CVE-2022-410xx/CVE-2022-41082.json index 03764ef6679..499f9dc2528 100644 --- a/CVE-2022/CVE-2022-410xx/CVE-2022-41082.json +++ b/CVE-2022/CVE-2022-410xx/CVE-2022-41082.json @@ -2,8 +2,9 @@ "id": "CVE-2022-41082", "sourceIdentifier": "secure@microsoft.com", "published": "2022-10-03T01:15:08.843", - "lastModified": "2023-12-20T20:15:18.737", - "vulnStatus": "Modified", + "lastModified": "2024-06-28T14:00:52.743", + "vulnStatus": "Analyzed", + "cveTags": [], "cisaExploitAdd": "2022-09-30", "cisaActionDue": "2022-10-21", "cisaRequiredAction": "Apply updates per vendor instructions.", @@ -119,7 +120,10 @@ }, { "url": "https://www.secpod.com/blog/microsoft-november-2022-patch-tuesday-patches-65-vulnerabilities-including-6-zero-days/", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-410xx/CVE-2022-41091.json b/CVE-2022/CVE-2022-410xx/CVE-2022-41091.json index 6d18190f889..832ae0139ef 100644 --- a/CVE-2022/CVE-2022-410xx/CVE-2022-41091.json +++ b/CVE-2022/CVE-2022-410xx/CVE-2022-41091.json @@ -2,8 +2,9 @@ "id": "CVE-2022-41091", "sourceIdentifier": "secure@microsoft.com", "published": "2022-11-09T22:15:22.093", - "lastModified": "2023-08-08T14:21:49.707", - "vulnStatus": "Modified", + "lastModified": "2024-06-28T13:50:02.067", + "vulnStatus": "Analyzed", + "cveTags": [], "cisaExploitAdd": "2022-11-08", "cisaActionDue": "2022-12-09", "cisaRequiredAction": "Apply updates per vendor instructions.", @@ -49,7 +50,7 @@ "description": [ { "lang": "en", - "value": "CWE-269" + "value": "NVD-CWE-noinfo" } ] } @@ -63,78 +64,75 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", - "matchCriteriaId": "21540673-614A-4D40-8BD7-3F07723803B0" + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.10240.19567", + "matchCriteriaId": "D1B6D84B-3C19-443B-AC82-A2CBF2E91B85" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*", - "matchCriteriaId": "9E2C378B-1507-4C81-82F6-9F599616845A" + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.5501", + "matchCriteriaId": "C4E7A8EB-F231-4358-B2F0-86CE298DCB32" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:*:*", - "matchCriteriaId": "FAE4278F-71A7-43E9-8F79-1CBFAE71D730" + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.3650", + "matchCriteriaId": "FD13C1A3-0D55-44B4-BCDA-3FE16F3FD0BB" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:*:*", - "matchCriteriaId": "71E65CB9-6DC2-4A90-8C6A-103BEDC99823" + "criteria": "cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19042.2251", + "matchCriteriaId": "53D74F18-E886-4BDD-BF98-6E3E7FDB416A" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:22h2:*:*:*:*:*:*:*", - "matchCriteriaId": "9D5DE444-AEA8-4674-AC58-31FC1F12BB55" + "criteria": "cpe:2.3:o:microsoft:windows_10_21h1:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19043.2251", + "matchCriteriaId": "6CD19777-D4BC-4091-B5DF-196E3A5ECD41" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", - "matchCriteriaId": "E01A4CCA-4C43-46E0-90E6-3E4DBFBACD64" + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19044.2251", + "matchCriteriaId": "A22FD3BC-3283-49FD-89E7-120BD1BD5664" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", - "matchCriteriaId": "6B8F3DD2-A145-4AF1-8545-CC42892DA3D1" + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19045.2251", + "matchCriteriaId": "71F26E89-0870-4C4A-81FE-F9F793A9E706" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:arm64:*", - "matchCriteriaId": "B9F64296-66BF-4F1D-A11C-0C44C347E2AC" + "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22000.1219", + "matchCriteriaId": "701F768A-FE97-481C-87FE-53135E160DD8" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:x64:*", - "matchCriteriaId": "5D7F7DDB-440E-42CD-82F4-B2C13F3CC462" + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22621.819", + "matchCriteriaId": "633EBB51-1843-47BD-8CA2-7A51EAF71B44" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_11:22h2:*:*:*:*:*:arm64:*", - "matchCriteriaId": "747ED159-1972-4310-AAD1-8E02AFB08826" + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.5501", + "matchCriteriaId": "A5D182FC-6882-441A-994F-39721FD69EC2" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_11:22h2:*:*:*:*:*:x64:*", - "matchCriteriaId": "62B9100B-206D-4FD1-8D23-A355DCA37460" + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.3650", + "matchCriteriaId": "BD54B434-65C1-414E-9498-67E871281112" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", - "matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", - "matchCriteriaId": "DB79EE26-FC32-417D-A49C-A1A63165A968" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*", - "matchCriteriaId": "821614DD-37DD-44E2-A8A4-FE8D23A33C3C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:datacenter\\:_azure:*:*:*", - "matchCriteriaId": "8B84E4CE-34ED-435A-ADF7-9A8540DE7568" + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.20348.1249", + "matchCriteriaId": "9883B9FF-9A73-4FAE-83C1-27CD9346ABED" } ] } @@ -144,7 +142,11 @@ "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41091", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-411xx/CVE-2022-41125.json b/CVE-2022/CVE-2022-411xx/CVE-2022-41125.json index 15ca132e473..1b23414b7d4 100644 --- a/CVE-2022/CVE-2022-411xx/CVE-2022-41125.json +++ b/CVE-2022/CVE-2022-411xx/CVE-2022-41125.json @@ -2,8 +2,9 @@ "id": "CVE-2022-41125", "sourceIdentifier": "secure@microsoft.com", "published": "2022-11-09T22:15:25.307", - "lastModified": "2023-08-08T14:21:49.707", - "vulnStatus": "Modified", + "lastModified": "2024-06-28T13:50:11.033", + "vulnStatus": "Analyzed", + "cveTags": [], "cisaExploitAdd": "2022-11-08", "cisaActionDue": "2022-12-09", "cisaRequiredAction": "Apply updates per vendor instructions.", @@ -63,53 +64,57 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", - "matchCriteriaId": "21540673-614A-4D40-8BD7-3F07723803B0" + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.10240.19567", + "matchCriteriaId": "D1B6D84B-3C19-443B-AC82-A2CBF2E91B85" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*", - "matchCriteriaId": "9E2C378B-1507-4C81-82F6-9F599616845A" + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.5501", + "matchCriteriaId": "C4E7A8EB-F231-4358-B2F0-86CE298DCB32" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:*:*", - "matchCriteriaId": "FAE4278F-71A7-43E9-8F79-1CBFAE71D730" + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.3650", + "matchCriteriaId": "FD13C1A3-0D55-44B4-BCDA-3FE16F3FD0BB" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:*:*", - "matchCriteriaId": "71E65CB9-6DC2-4A90-8C6A-103BEDC99823" + "criteria": "cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19042.2251", + "matchCriteriaId": "53D74F18-E886-4BDD-BF98-6E3E7FDB416A" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:22h2:*:*:*:*:*:*:*", - "matchCriteriaId": "9D5DE444-AEA8-4674-AC58-31FC1F12BB55" + "criteria": "cpe:2.3:o:microsoft:windows_10_21h1:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19043.2251", + "matchCriteriaId": "6CD19777-D4BC-4091-B5DF-196E3A5ECD41" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", - "matchCriteriaId": "E01A4CCA-4C43-46E0-90E6-3E4DBFBACD64" + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19044.2251", + "matchCriteriaId": "A22FD3BC-3283-49FD-89E7-120BD1BD5664" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", - "matchCriteriaId": "6B8F3DD2-A145-4AF1-8545-CC42892DA3D1" + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19045.2251", + "matchCriteriaId": "71F26E89-0870-4C4A-81FE-F9F793A9E706" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:x64:*", - "matchCriteriaId": "5D7F7DDB-440E-42CD-82F4-B2C13F3CC462" + "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22000.1219", + "matchCriteriaId": "701F768A-FE97-481C-87FE-53135E160DD8" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_11:22h2:*:*:*:*:*:x64:*", - "matchCriteriaId": "62B9100B-206D-4FD1-8D23-A355DCA37460" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_7:sp1:*:*:*:*:*:*:*", - "matchCriteriaId": "84079754-7D44-439C-ADFC-C560945B6DF1" + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22621.819", + "matchCriteriaId": "633EBB51-1843-47BD-8CA2-7A51EAF71B44" }, { "vulnerable": true, @@ -133,18 +138,21 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", - "matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7" + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.5501", + "matchCriteriaId": "A5D182FC-6882-441A-994F-39721FD69EC2" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", - "matchCriteriaId": "DB79EE26-FC32-417D-A49C-A1A63165A968" + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.3650", + "matchCriteriaId": "BD54B434-65C1-414E-9498-67E871281112" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*", - "matchCriteriaId": "821614DD-37DD-44E2-A8A4-FE8D23A33C3C" + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.20348.1249", + "matchCriteriaId": "9883B9FF-9A73-4FAE-83C1-27CD9346ABED" } ] } @@ -154,7 +162,11 @@ "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41125", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-411xx/CVE-2022-41128.json b/CVE-2022/CVE-2022-411xx/CVE-2022-41128.json index 9e25885e8e7..38f73286f96 100644 --- a/CVE-2022/CVE-2022-411xx/CVE-2022-41128.json +++ b/CVE-2022/CVE-2022-411xx/CVE-2022-41128.json @@ -2,8 +2,9 @@ "id": "CVE-2022-41128", "sourceIdentifier": "secure@microsoft.com", "published": "2022-11-09T22:15:25.453", - "lastModified": "2023-08-08T14:21:49.707", - "vulnStatus": "Modified", + "lastModified": "2024-06-28T13:50:22.857", + "vulnStatus": "Analyzed", + "cveTags": [], "cisaExploitAdd": "2022-11-08", "cisaActionDue": "2022-12-09", "cisaRequiredAction": "Apply updates per vendor instructions.", @@ -63,48 +64,57 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", - "matchCriteriaId": "21540673-614A-4D40-8BD7-3F07723803B0" + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.10240.19567", + "matchCriteriaId": "D1B6D84B-3C19-443B-AC82-A2CBF2E91B85" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*", - "matchCriteriaId": "9E2C378B-1507-4C81-82F6-9F599616845A" + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.5501", + "matchCriteriaId": "C4E7A8EB-F231-4358-B2F0-86CE298DCB32" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:*:*", - "matchCriteriaId": "FAE4278F-71A7-43E9-8F79-1CBFAE71D730" + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.3650", + "matchCriteriaId": "FD13C1A3-0D55-44B4-BCDA-3FE16F3FD0BB" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:*:*", - "matchCriteriaId": "71E65CB9-6DC2-4A90-8C6A-103BEDC99823" + "criteria": "cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19042.2251", + "matchCriteriaId": "53D74F18-E886-4BDD-BF98-6E3E7FDB416A" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:22h2:*:*:*:*:*:*:*", - "matchCriteriaId": "9D5DE444-AEA8-4674-AC58-31FC1F12BB55" + "criteria": "cpe:2.3:o:microsoft:windows_10_21h1:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19043.2251", + "matchCriteriaId": "6CD19777-D4BC-4091-B5DF-196E3A5ECD41" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", - "matchCriteriaId": "E01A4CCA-4C43-46E0-90E6-3E4DBFBACD64" + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19044.2251", + "matchCriteriaId": "A22FD3BC-3283-49FD-89E7-120BD1BD5664" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", - "matchCriteriaId": "6B8F3DD2-A145-4AF1-8545-CC42892DA3D1" + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19045.2251", + "matchCriteriaId": "71F26E89-0870-4C4A-81FE-F9F793A9E706" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:x64:*", - "matchCriteriaId": "5D7F7DDB-440E-42CD-82F4-B2C13F3CC462" + "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22000.1219", + "matchCriteriaId": "701F768A-FE97-481C-87FE-53135E160DD8" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_11:22h2:*:*:*:*:*:x64:*", - "matchCriteriaId": "62B9100B-206D-4FD1-8D23-A355DCA37460" + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22621.819", + "matchCriteriaId": "633EBB51-1843-47BD-8CA2-7A51EAF71B44" }, { "vulnerable": true, @@ -138,18 +148,21 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", - "matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7" + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.5501", + "matchCriteriaId": "A5D182FC-6882-441A-994F-39721FD69EC2" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", - "matchCriteriaId": "DB79EE26-FC32-417D-A49C-A1A63165A968" + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.3650", + "matchCriteriaId": "BD54B434-65C1-414E-9498-67E871281112" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*", - "matchCriteriaId": "821614DD-37DD-44E2-A8A4-FE8D23A33C3C" + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.20348.1249", + "matchCriteriaId": "9883B9FF-9A73-4FAE-83C1-27CD9346ABED" } ] } @@ -159,7 +172,11 @@ "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41128", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-413xx/CVE-2022-41328.json b/CVE-2022/CVE-2022-413xx/CVE-2022-41328.json index 95e0d5d6184..4d7a4e11f21 100644 --- a/CVE-2022/CVE-2022-413xx/CVE-2022-41328.json +++ b/CVE-2022/CVE-2022-413xx/CVE-2022-41328.json @@ -2,8 +2,9 @@ "id": "CVE-2022-41328", "sourceIdentifier": "psirt@fortinet.com", "published": "2023-03-07T17:15:12.093", - "lastModified": "2023-11-07T03:52:46.887", - "vulnStatus": "Modified", + "lastModified": "2024-06-28T13:41:47.953", + "vulnStatus": "Analyzed", + "cveTags": [], "cisaExploitAdd": "2023-03-14", "cisaActionDue": "2023-04-04", "cisaRequiredAction": "Apply updates per vendor instructions.", @@ -98,29 +99,29 @@ "vulnerable": true, "criteria": "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*", "versionStartIncluding": "6.2.0", - "versionEndIncluding": "6.2.13", - "matchCriteriaId": "3CD57A5A-2B13-495A-8530-8F97E1720602" + "versionEndExcluding": "6.2.14", + "matchCriteriaId": "D539CF21-2985-4E9B-94E8-E0B696752291" }, { "vulnerable": true, "criteria": "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*", "versionStartIncluding": "6.4.0", - "versionEndIncluding": "6.4.11", - "matchCriteriaId": "A87D865A-6411-4807-81D4-6A5C052C03C9" + "versionEndExcluding": "6.4.12", + "matchCriteriaId": "D4AA72D9-CD66-4628-92B5-6CDFCB8E0EEE" }, { "vulnerable": true, "criteria": "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*", "versionStartIncluding": "7.0.0", - "versionEndIncluding": "7.0.9", - "matchCriteriaId": "9E775D02-7C02-40BE-A118-D874B9BBC936" + "versionEndExcluding": "7.0.10", + "matchCriteriaId": "8EB54D85-8A3B-4F40-A814-3636F2AC99F3" }, { "vulnerable": true, "criteria": "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*", "versionStartIncluding": "7.2.0", - "versionEndIncluding": "7.2.3", - "matchCriteriaId": "813E179E-B948-4480-A5B1-B0ED562A41BC" + "versionEndExcluding": "7.2.4", + "matchCriteriaId": "7582B2FF-8EDC-4599-96F3-CFA7BAE1FCF5" } ] } diff --git a/CVE-2022/CVE-2022-41xx/CVE-2022-4135.json b/CVE-2022/CVE-2022-41xx/CVE-2022-4135.json index af53e15672d..26800da23dc 100644 --- a/CVE-2022/CVE-2022-41xx/CVE-2022-4135.json +++ b/CVE-2022/CVE-2022-41xx/CVE-2022-4135.json @@ -2,8 +2,9 @@ "id": "CVE-2022-4135", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2022-11-25T01:15:09.957", - "lastModified": "2024-02-15T02:00:01.650", - "vulnStatus": "Modified", + "lastModified": "2024-06-28T13:49:20.760", + "vulnStatus": "Analyzed", + "cveTags": [], "cisaExploitAdd": "2022-11-28", "cisaActionDue": "2022-12-19", "cisaRequiredAction": "Apply updates per vendor instructions.", @@ -107,12 +108,16 @@ "url": "https://crbug.com/1392715", "source": "chrome-cve-admin@google.com", "tags": [ - "Permissions Required" + "Exploit", + "Issue Tracking" ] }, { "url": "https://security.gentoo.org/glsa/202305-10", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-424xx/CVE-2022-42475.json b/CVE-2022/CVE-2022-424xx/CVE-2022-42475.json index 5b5679165c5..60b414d15fa 100644 --- a/CVE-2022/CVE-2022-424xx/CVE-2022-42475.json +++ b/CVE-2022/CVE-2022-424xx/CVE-2022-42475.json @@ -2,8 +2,9 @@ "id": "CVE-2022-42475", "sourceIdentifier": "psirt@fortinet.com", "published": "2023-01-02T09:15:09.490", - "lastModified": "2023-11-07T03:53:22.660", - "vulnStatus": "Modified", + "lastModified": "2024-06-28T13:48:44.240", + "vulnStatus": "Analyzed", + "cveTags": [], "cisaExploitAdd": "2022-12-13", "cisaActionDue": "2023-01-03", "cisaRequiredAction": "Apply updates per vendor instructions.", @@ -123,36 +124,36 @@ "vulnerable": true, "criteria": "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*", "versionStartIncluding": "6.0.0", - "versionEndIncluding": "6.0.15", - "matchCriteriaId": "7CB40CF0-CC6A-44A5-BC5D-70DC7CA78D49" + "versionEndExcluding": "6.0.16", + "matchCriteriaId": "795298D3-0C06-471C-87E2-2D04AC190EAD" }, { "vulnerable": true, "criteria": "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*", "versionStartIncluding": "6.2.0", - "versionEndIncluding": "6.2.11", - "matchCriteriaId": "E417AB31-3C1E-47C9-941B-36026B4379E8" + "versionEndExcluding": "6.2.12", + "matchCriteriaId": "F6785608-14A0-4825-BEC0-899E55A9FDF1" }, { "vulnerable": true, "criteria": "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*", "versionStartIncluding": "6.4.0", - "versionEndIncluding": "6.4.10", - "matchCriteriaId": "FF6F9869-F824-4519-986E-A032668EA7BA" + "versionEndExcluding": "6.4.11", + "matchCriteriaId": "55E67EF5-6AF0-410A-BDE7-CF745ED97328" }, { "vulnerable": true, "criteria": "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*", "versionStartIncluding": "7.0.0", - "versionEndIncluding": "7.0.8", - "matchCriteriaId": "0983FC2C-A9F2-4918-81E6-BDCF05E5BF65" + "versionEndExcluding": "7.0.9", + "matchCriteriaId": "C424900B-9A5E-440C-996B-2CF426F2CAA3" }, { "vulnerable": true, "criteria": "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*", "versionStartIncluding": "7.2.0", - "versionEndIncluding": "7.2.2", - "matchCriteriaId": "44D491C7-B93B-4CCB-AD79-2FD2429486A9" + "versionEndExcluding": "7.2.3", + "matchCriteriaId": "00E89C95-E9FB-473A-BEB0-FA8E7225AC55" } ] } @@ -196,13 +197,15 @@ "vulnerable": true, "criteria": "cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:*", "versionStartIncluding": "7.0.0", - "versionEndIncluding": "7.0.7", - "matchCriteriaId": "3F3A99BB-534C-4984-948B-8FFF659A9B9B" + "versionEndExcluding": "7.0.8", + "matchCriteriaId": "81E60913-FBE9-467B-AB4B-CA85E97527BA" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:fortinet:fortiproxy:7.2.0:*:*:*:*:*:*:*", - "matchCriteriaId": "F5F302F8-482A-4DA9-BDD9-63886B202B52" + "criteria": "cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.2.0", + "versionEndExcluding": "7.2.2", + "matchCriteriaId": "F5B24750-4A57-4F80-AAE8-8AC316B376C2" } ] } @@ -219,29 +222,29 @@ "vulnerable": true, "criteria": "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*", "versionStartIncluding": "6.0.0", - "versionEndIncluding": "6.0.14", - "matchCriteriaId": "0A857126-D7EE-4CB4-BCAA-68D6C4FEC3E4" + "versionEndExcluding": "6.0.15", + "matchCriteriaId": "77974073-D92D-4EB8-854F-A6DCCD13C868" }, { "vulnerable": true, "criteria": "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*", "versionStartIncluding": "6.2.0", - "versionEndIncluding": "6.2.11", - "matchCriteriaId": "E417AB31-3C1E-47C9-941B-36026B4379E8" + "versionEndExcluding": "6.2.12", + "matchCriteriaId": "F6785608-14A0-4825-BEC0-899E55A9FDF1" }, { "vulnerable": true, "criteria": "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*", "versionStartIncluding": "6.4.0", - "versionEndIncluding": "6.4.9", - "matchCriteriaId": "EA09A86A-A8BE-45F7-96C8-747C5DB658C5" + "versionEndExcluding": "6.4.10", + "matchCriteriaId": "6A7730E2-63AD-48F2-AE0A-6C8C9369A734" }, { "vulnerable": true, "criteria": "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*", "versionStartIncluding": "7.0.0", - "versionEndIncluding": "7.0.7", - "matchCriteriaId": "DEC5CAD3-53CB-45C3-B4EA-10AEFE6C0016" + "versionEndExcluding": "7.0.8", + "matchCriteriaId": "EE6D1D19-1227-42BE-87A7-E798D60059A5" } ] }, diff --git a/CVE-2022/CVE-2022-428xx/CVE-2022-42856.json b/CVE-2022/CVE-2022-428xx/CVE-2022-42856.json index 0241f0709a2..4c0aaa765e3 100644 --- a/CVE-2022/CVE-2022-428xx/CVE-2022-42856.json +++ b/CVE-2022/CVE-2022-428xx/CVE-2022-42856.json @@ -2,8 +2,9 @@ "id": "CVE-2022-42856", "sourceIdentifier": "product-security@apple.com", "published": "2022-12-15T19:15:25.123", - "lastModified": "2023-05-30T06:15:29.513", - "vulnStatus": "Modified", + "lastModified": "2024-06-28T13:48:32.387", + "vulnStatus": "Analyzed", + "cveTags": [], "cisaExploitAdd": "2022-12-14", "cisaActionDue": "2023-01-04", "cisaRequiredAction": "Apply updates per vendor instructions.", @@ -154,7 +155,10 @@ }, { "url": "https://security.gentoo.org/glsa/202305-32", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT213516", diff --git a/CVE-2022/CVE-2022-446xx/CVE-2022-44698.json b/CVE-2022/CVE-2022-446xx/CVE-2022-44698.json index 2b87367151e..8dd19caa161 100644 --- a/CVE-2022/CVE-2022-446xx/CVE-2022-44698.json +++ b/CVE-2022/CVE-2022-446xx/CVE-2022-44698.json @@ -2,8 +2,9 @@ "id": "CVE-2022-44698", "sourceIdentifier": "secure@microsoft.com", "published": "2022-12-13T19:15:14.403", - "lastModified": "2023-08-08T14:22:24.967", - "vulnStatus": "Modified", + "lastModified": "2024-06-28T13:49:07.303", + "vulnStatus": "Analyzed", + "cveTags": [], "cisaExploitAdd": "2022-12-13", "cisaActionDue": "2023-01-03", "cisaRequiredAction": "Apply updates per vendor instructions.", @@ -63,58 +64,63 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*", - "matchCriteriaId": "9E2C378B-1507-4C81-82F6-9F599616845A" + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.5582", + "matchCriteriaId": "1152573C-4DAD-4CE2-B14E-298EC99E60C4" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:*:*", - "matchCriteriaId": "FAE4278F-71A7-43E9-8F79-1CBFAE71D730" + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.3770", + "matchCriteriaId": "3E4A31D2-D1B3-4B4C-8EE3-44AC4C3B48E7" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:*:*", - "matchCriteriaId": "71E65CB9-6DC2-4A90-8C6A-103BEDC99823" + "criteria": "cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19042.2364", + "matchCriteriaId": "AA5A49C2-6A51-4A73-AC74-532BC6430763" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:22h2:*:*:*:*:*:*:*", - "matchCriteriaId": "9D5DE444-AEA8-4674-AC58-31FC1F12BB55" + "criteria": "cpe:2.3:o:microsoft:windows_10_21h1:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19043.2364", + "matchCriteriaId": "86AEB671-97BB-4C0C-AC20-AFF67C541FA3" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", - "matchCriteriaId": "E01A4CCA-4C43-46E0-90E6-3E4DBFBACD64" + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19044.2364", + "matchCriteriaId": "B0458BC1-9795-459C-826C-A6A094AE03DB" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", - "matchCriteriaId": "6B8F3DD2-A145-4AF1-8545-CC42892DA3D1" + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19045.2364", + "matchCriteriaId": "0D4D2A8F-5F2C-4A6F-902C-6C1DAD745CCE" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:arm64:*", - "matchCriteriaId": "B9F64296-66BF-4F1D-A11C-0C44C347E2AC" + "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22000.1335", + "matchCriteriaId": "9E936B0C-9BA0-4C70-8469-F8D79A9B72E4" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:x64:*", - "matchCriteriaId": "5D7F7DDB-440E-42CD-82F4-B2C13F3CC462" + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.5582", + "matchCriteriaId": "F6895679-42F4-4BF6-97B9-1A70BA5DC0DE" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", - "matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7" + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.3770", + "matchCriteriaId": "E7E90374-0F55-4380-A2A2-369D41AF5673" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", - "matchCriteriaId": "DB79EE26-FC32-417D-A49C-A1A63165A968" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*", - "matchCriteriaId": "821614DD-37DD-44E2-A8A4-FE8D23A33C3C" + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.20348.1366", + "matchCriteriaId": "FA8C1ACD-6E63-4942-98F5-2D1E9F393255" } ] } @@ -124,7 +130,11 @@ "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-44698", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-448xx/CVE-2022-44877.json b/CVE-2022/CVE-2022-448xx/CVE-2022-44877.json index 7505bee51cd..735ae986840 100644 --- a/CVE-2022/CVE-2022-448xx/CVE-2022-44877.json +++ b/CVE-2022/CVE-2022-448xx/CVE-2022-44877.json @@ -2,8 +2,9 @@ "id": "CVE-2022-44877", "sourceIdentifier": "cve@mitre.org", "published": "2023-01-05T23:15:09.150", - "lastModified": "2023-04-06T17:15:09.703", - "vulnStatus": "Modified", + "lastModified": "2024-06-28T13:45:26.473", + "vulnStatus": "Analyzed", + "cveTags": [], "cisaExploitAdd": "2023-01-17", "cisaActionDue": "2023-02-07", "cisaRequiredAction": "Apply updates per vendor instructions.", @@ -89,7 +90,12 @@ }, { "url": "http://packetstormsecurity.com/files/171725/Control-Web-Panel-7-CWP7-0.9.8.1147-Remote-Code-Execution.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://seclists.org/fulldisclosure/2023/Jan/1", diff --git a/CVE-2022/CVE-2022-461xx/CVE-2022-46169.json b/CVE-2022/CVE-2022-461xx/CVE-2022-46169.json index 6ffbe36e707..883e78cb33b 100644 --- a/CVE-2022/CVE-2022-461xx/CVE-2022-46169.json +++ b/CVE-2022/CVE-2022-461xx/CVE-2022-46169.json @@ -2,8 +2,9 @@ "id": "CVE-2022-46169", "sourceIdentifier": "security-advisories@github.com", "published": "2022-12-05T21:15:10.527", - "lastModified": "2023-11-07T03:55:04.360", - "vulnStatus": "Modified", + "lastModified": "2024-06-28T13:43:32.350", + "vulnStatus": "Analyzed", + "cveTags": [], "cisaExploitAdd": "2023-02-16", "cisaActionDue": "2023-03-09", "cisaRequiredAction": "Apply updates per vendor instructions.", @@ -98,8 +99,8 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:cacti:cacti:*:*:*:*:*:*:*:*", - "versionEndIncluding": "1.2.22", - "matchCriteriaId": "5EE8829F-0F7E-4FAA-8CBB-D29B1CB65EF6" + "versionEndExcluding": "1.2.23", + "matchCriteriaId": "B252EEC1-25BE-428B-96CA-22A0E812D3BA" } ] } diff --git a/CVE-2022/CVE-2022-479xx/CVE-2022-47966.json b/CVE-2022/CVE-2022-479xx/CVE-2022-47966.json index 0cb49edce69..48fac11dccc 100644 --- a/CVE-2022/CVE-2022-479xx/CVE-2022-47966.json +++ b/CVE-2022/CVE-2022-479xx/CVE-2022-47966.json @@ -2,8 +2,9 @@ "id": "CVE-2022-47966", "sourceIdentifier": "cve@mitre.org", "published": "2023-01-18T18:15:10.570", - "lastModified": "2023-09-11T20:15:07.817", - "vulnStatus": "Modified", + "lastModified": "2024-06-28T13:45:13.313", + "vulnStatus": "Analyzed", + "cveTags": [], "cisaExploitAdd": "2023-01-23", "cisaActionDue": "2023-02-13", "cisaRequiredAction": "Apply updates per vendor instructions.", @@ -1012,23 +1013,46 @@ "references": [ { "url": "http://packetstormsecurity.com/files/170882/Zoho-ManageEngine-ServiceDesk-Plus-14003-Remote-Code-Execution.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://packetstormsecurity.com/files/170925/ManageEngine-ADSelfService-Plus-Unauthenticated-SAML-Remote-Code-Execution.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://packetstormsecurity.com/files/170943/Zoho-ManageEngine-Endpoint-Central-MSP-10.1.2228.10-Remote-Code-Execution.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://attackerkb.com/topics/gvs0Gv8BID/cve-2022-47966/rapid7-analysis", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://blog.viettelcybersecurity.com/saml-show-stopper/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/apache/santuario-xml-security-java/tags?after=1.4.6", @@ -1040,15 +1064,26 @@ }, { "url": "https://github.com/horizon3ai/CVE-2022-47966", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-250a", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] }, { "url": "https://www.horizon3.ai/manageengine-cve-2022-47966-technical-deep-dive/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://www.manageengine.com/security/advisory/CVE/cve-2022-47966.html", diff --git a/CVE-2023/CVE-2023-06xx/CVE-2023-0669.json b/CVE-2023/CVE-2023-06xx/CVE-2023-0669.json index b8376ed37de..8d87e95d91d 100644 --- a/CVE-2023/CVE-2023-06xx/CVE-2023-0669.json +++ b/CVE-2023/CVE-2023-06xx/CVE-2023-0669.json @@ -2,8 +2,9 @@ "id": "CVE-2023-0669", "sourceIdentifier": "cve@rapid7.com", "published": "2023-02-06T20:15:14.300", - "lastModified": "2023-04-10T20:15:08.170", - "vulnStatus": "Modified", + "lastModified": "2024-06-28T13:44:07.773", + "vulnStatus": "Analyzed", + "cveTags": [], "cisaExploitAdd": "2023-02-10", "cisaActionDue": "2023-03-03", "cisaRequiredAction": "Apply updates per vendor instructions.", @@ -81,7 +82,12 @@ "references": [ { "url": "http://packetstormsecurity.com/files/171789/Goanywhere-Encryption-Helper-7.1.1-Remote-Code-Execution.html", - "source": "cve@rapid7.com" + "source": "cve@rapid7.com", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://attackerkb.com/topics/mg883Nbeva/cve-2023-0669/rapid7-analysis", diff --git a/CVE-2023/CVE-2023-216xx/CVE-2023-21674.json b/CVE-2023/CVE-2023-216xx/CVE-2023-21674.json index 9f2f70b6479..8f90f9603c3 100644 --- a/CVE-2023/CVE-2023-216xx/CVE-2023-21674.json +++ b/CVE-2023/CVE-2023-216xx/CVE-2023-21674.json @@ -2,8 +2,9 @@ "id": "CVE-2023-21674", "sourceIdentifier": "secure@microsoft.com", "published": "2023-01-10T22:15:16.307", - "lastModified": "2024-05-29T03:15:18.597", - "vulnStatus": "Modified", + "lastModified": "2024-06-28T13:45:47.150", + "vulnStatus": "Analyzed", + "cveTags": [], "cisaExploitAdd": "2023-01-10", "cisaActionDue": "2023-01-31", "cisaRequiredAction": "Apply updates per vendor instructions.", @@ -49,7 +50,7 @@ "description": [ { "lang": "en", - "value": "NVD-CWE-noinfo" + "value": "CWE-416" } ] }, @@ -73,93 +74,56 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x64:*", - "matchCriteriaId": "5E491E46-1917-41FE-8F9A-BB0BDDEB42C3" + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.10240.19685", + "matchCriteriaId": "2A983693-C39E-424B-8A1E-BD7B3A199632" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x86:*", - "matchCriteriaId": "0A1BC97A-263E-4291-8AEF-02EE4E6031E9" + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.5648", + "matchCriteriaId": "960B3437-DF2C-4CF6-AF06-9AF1E6AC9EA5" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:arm64:*", - "matchCriteriaId": "73D24713-D897-408D-893B-77A61982597D" + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.3887", + "matchCriteriaId": "A7F8B54C-4564-497A-9786-876A516219C3" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:x64:*", - "matchCriteriaId": "306B7CE6-8239-4AED-9ED4-4C9F5B349F58" + "criteria": "cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19042.2486", + "matchCriteriaId": "9EC1EA32-6810-4092-BEBF-120FBE093A5B" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:x86:*", - "matchCriteriaId": "345FCD64-D37B-425B-B64C-8B1640B7E850" + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19044.2486", + "matchCriteriaId": "05BF289F-51FE-4CE5-8487-D909E4CA3D77" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10_20h2:-:*:*:*:*:*:arm64:*", - "matchCriteriaId": "E4150CE0-6A16-4C62-989B-840EF7880C36" + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19045.2486", + "matchCriteriaId": "127FA76C-101B-4DAB-9034-1B893016D06A" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10_20h2:-:*:*:*:*:*:x64:*", - "matchCriteriaId": "83C0919F-C4C8-45AE-BDA8-4D88BF0450D5" + "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22000.1455", + "matchCriteriaId": "84D221BE-D305-4BB8-ADAF-DEDFF7E35C8D" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10_20h2:-:*:*:*:*:*:x86:*", - "matchCriteriaId": "47D30450-851A-4C4E-9116-8CFCE5CFA276" + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22621.1105", + "matchCriteriaId": "3E62759B-9029-42E8-8807-1AC4C2D00401" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:-:*:*:*:*:*:arm64:*", - "matchCriteriaId": "8FC46499-DB6E-48BF-9334-85EE27AFE7AF" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:-:*:*:*:*:*:x64:*", - "matchCriteriaId": "83A79DD6-E74E-419F-93F1-323B68502633" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:-:*:*:*:*:*:x86:*", - "matchCriteriaId": "61959ACC-B608-4556-92AF-4D94B338907A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:-:*:*:*:*:*:arm64:*", - "matchCriteriaId": "A9D54EE6-30AF-411C-A285-A4DCB6C6EC06" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:-:*:*:*:*:*:x64:*", - "matchCriteriaId": "C230D3BF-7FCE-405C-B62E-B9190C995C3C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:-:*:*:*:*:*:x86:*", - "matchCriteriaId": "1FD62DCB-66D1-4CEA-828E-0BD302AC63CA" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:-:*:*:*:*:*:arm64:*", - "matchCriteriaId": "F2D718BD-C4B7-48DB-BE78-B9CA22F27DD0" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:-:*:*:*:*:*:x64:*", - "matchCriteriaId": "0C3552E0-F793-4CDD-965D-457495475805" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:-:*:*:*:*:*:arm64:*", - "matchCriteriaId": "B2D24C54-F04F-4717-B614-FE67B3ED9DC0" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:-:*:*:*:*:*:x64:*", - "matchCriteriaId": "D5EC3F68-8F41-4F6B-B2E5-920322A4A321" + "criteria": "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C6CE5198-C498-4672-AF4C-77AB4BE06C5C" }, { "vulnerable": true, @@ -168,18 +132,21 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", - "matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7" + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.5648", + "matchCriteriaId": "D1FFC699-725E-4F6A-988D-228613256CA3" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", - "matchCriteriaId": "DB79EE26-FC32-417D-A49C-A1A63165A968" + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.3887", + "matchCriteriaId": "7F9F1524-807A-49CC-9F15-B4967AF78E31" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*", - "matchCriteriaId": "821614DD-37DD-44E2-A8A4-FE8D23A33C3C" + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.20348.1487", + "matchCriteriaId": "D47581C0-F0DF-45D3-8BBF-B49E2172E01C" } ] } @@ -189,7 +156,11 @@ "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21674", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-229xx/CVE-2023-22952.json b/CVE-2023/CVE-2023-229xx/CVE-2023-22952.json index a962f373f66..6bb02fe748c 100644 --- a/CVE-2023/CVE-2023-229xx/CVE-2023-22952.json +++ b/CVE-2023/CVE-2023-229xx/CVE-2023-22952.json @@ -2,8 +2,9 @@ "id": "CVE-2023-22952", "sourceIdentifier": "cve@mitre.org", "published": "2023-01-11T09:15:08.787", - "lastModified": "2023-03-10T17:15:10.067", - "vulnStatus": "Modified", + "lastModified": "2024-06-28T13:44:28.923", + "vulnStatus": "Analyzed", + "cveTags": [], "cisaExploitAdd": "2023-02-02", "cisaActionDue": "2023-02-23", "cisaRequiredAction": "Apply updates per vendor instructions.", @@ -83,7 +84,12 @@ "references": [ { "url": "http://packetstormsecurity.com/files/171320/SugarCRM-12.x-Remote-Code-Execution-Shell-Upload.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://support.sugarcrm.com/Resources/Security/sugarcrm-sa-2023-001/", diff --git a/CVE-2023/CVE-2023-235xx/CVE-2023-23529.json b/CVE-2023/CVE-2023-235xx/CVE-2023-23529.json index 1001325d9b4..8f638fd7f6b 100644 --- a/CVE-2023/CVE-2023-235xx/CVE-2023-23529.json +++ b/CVE-2023/CVE-2023-235xx/CVE-2023-23529.json @@ -2,8 +2,9 @@ "id": "CVE-2023-23529", "sourceIdentifier": "product-security@apple.com", "published": "2023-02-27T20:15:14.710", - "lastModified": "2023-07-27T04:15:15.413", - "vulnStatus": "Modified", + "lastModified": "2024-06-28T13:43:51.860", + "vulnStatus": "Analyzed", + "cveTags": [], "cisaExploitAdd": "2023-02-14", "cisaActionDue": "2023-03-07", "cisaRequiredAction": "Apply updates per vendor instructions.", @@ -66,20 +67,35 @@ { "vulnerable": true, "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", + "versionEndExcluding": "15.7.4", + "matchCriteriaId": "6342B4CB-4D7D-4FBD-8A5E-E3DABDC7770E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", + "versionStartIncluding": "16.0", "versionEndExcluding": "16.3.1", - "matchCriteriaId": "E5B28D85-E3A2-4118-A63D-C6D4BB0BDE3A" + "matchCriteriaId": "30E7C45D-05AC-4F31-BA68-88494D32193B" }, { "vulnerable": true, "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", + "versionEndExcluding": "15.7.4", + "matchCriteriaId": "C75E4307-6CF3-4835-8E5F-96BF060658C8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", + "versionStartIncluding": "16.0", "versionEndExcluding": "16.3.1", - "matchCriteriaId": "2D2380DB-BDAF-461E-8200-1AE8044F618F" + "matchCriteriaId": "F9AD7A33-3B5A-4BBB-982F-95BA21035677" }, { "vulnerable": true, "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "13.0", "versionEndExcluding": "13.2.1", - "matchCriteriaId": "B40AA062-1B77-4AA0-B1ED-1E91761BC417" + "matchCriteriaId": "029F0FBC-6765-4560-B98E-7CAB10555DDC" } ] } @@ -110,7 +126,10 @@ }, { "url": "https://support.apple.com/en-us/HT213673", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-248xx/CVE-2023-24880.json b/CVE-2023/CVE-2023-248xx/CVE-2023-24880.json index edfbd070dc3..f9106a8be6f 100644 --- a/CVE-2023/CVE-2023-248xx/CVE-2023-24880.json +++ b/CVE-2023/CVE-2023-248xx/CVE-2023-24880.json @@ -2,8 +2,9 @@ "id": "CVE-2023-24880", "sourceIdentifier": "secure@microsoft.com", "published": "2023-03-14T17:15:17.683", - "lastModified": "2024-05-29T04:15:34.813", - "vulnStatus": "Modified", + "lastModified": "2024-06-28T13:42:03.037", + "vulnStatus": "Analyzed", + "cveTags": [], "cisaExploitAdd": "2023-03-14", "cisaActionDue": "2023-04-04", "cisaRequiredAction": "Apply updates per vendor instructions.", diff --git a/CVE-2023/CVE-2023-263xx/CVE-2023-26360.json b/CVE-2023/CVE-2023-263xx/CVE-2023-26360.json index 0499389386e..edc2d5aa549 100644 --- a/CVE-2023/CVE-2023-263xx/CVE-2023-26360.json +++ b/CVE-2023/CVE-2023-263xx/CVE-2023-26360.json @@ -2,8 +2,9 @@ "id": "CVE-2023-26360", "sourceIdentifier": "psirt@adobe.com", "published": "2023-03-23T20:15:15.263", - "lastModified": "2023-05-01T18:15:49.787", - "vulnStatus": "Modified", + "lastModified": "2024-06-28T13:41:32.437", + "vulnStatus": "Analyzed", + "cveTags": [], "cisaExploitAdd": "2023-03-15", "cisaActionDue": "2023-04-05", "cisaRequiredAction": "Apply updates per vendor instructions.", @@ -60,8 +61,18 @@ }, "weaknesses": [ { - "source": "psirt@adobe.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + }, + { + "source": "psirt@adobe.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -195,7 +206,12 @@ "references": [ { "url": "http://packetstormsecurity.com/files/172079/Adobe-ColdFusion-Unauthenticated-Remote-Code-Execution.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://helpx.adobe.com/security/products/coldfusion/apsb23-25.html", diff --git a/CVE-2023/CVE-2023-276xx/CVE-2023-27636.json b/CVE-2023/CVE-2023-276xx/CVE-2023-27636.json index f803eb043ec..3b7a6ec69ea 100644 --- a/CVE-2023/CVE-2023-276xx/CVE-2023-27636.json +++ b/CVE-2023/CVE-2023-276xx/CVE-2023-27636.json @@ -2,8 +2,9 @@ "id": "CVE-2023-27636", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-16T21:15:50.620", - "lastModified": "2024-06-17T12:42:04.623", + "lastModified": "2024-06-28T15:15:03.047", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -19,6 +20,10 @@ { "url": "https://aldisaw.id/security/2024/06/03/CVE-2023-27636.html", "source": "cve@mitre.org" + }, + { + "url": "https://www.exploit-db.com/exploits/52035", + "source": "cve@mitre.org" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-478xx/CVE-2023-47802.json b/CVE-2023/CVE-2023-478xx/CVE-2023-47802.json new file mode 100644 index 00000000000..ab91eb9670f --- /dev/null +++ b/CVE-2023/CVE-2023-478xx/CVE-2023-47802.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2023-47802", + "sourceIdentifier": "security@synology.com", + "published": "2024-06-28T06:15:03.220", + "lastModified": "2024-06-28T10:27:00.920", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability regarding improper neutralization of special elements used in an OS command ('OS Command Injection') is found in the IP block functionality. This allows remote authenticated users with administrator privileges to execute arbitrary commands via unspecified vectors. The following models with Synology Camera Firmware versions before 1.0.7-0298 may be affected: BC500 and TC500." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@synology.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "security@synology.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], + "references": [ + { + "url": "https://www.synology.com/en-global/security/advisory/Synology_SA_23_15", + "source": "security@synology.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-478xx/CVE-2023-47803.json b/CVE-2023/CVE-2023-478xx/CVE-2023-47803.json new file mode 100644 index 00000000000..ad8a81384c5 --- /dev/null +++ b/CVE-2023/CVE-2023-478xx/CVE-2023-47803.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2023-47803", + "sourceIdentifier": "security@synology.com", + "published": "2024-06-28T06:15:04.833", + "lastModified": "2024-06-28T10:27:00.920", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability regarding improper limitation of a pathname to a restricted directory ('Path Traversal') is found in the Language Settings functionality. This allows remote attackers to read specific files containing non-sensitive information via unspecified vectors. The following models with Synology Camera Firmware versions before 1.0.7-0298 may be affected: BC500 and TC500." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@synology.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "security@synology.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "references": [ + { + "url": "https://www.synology.com/en-global/security/advisory/Synology_SA_23_15", + "source": "security@synology.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-527xx/CVE-2023-52722.json b/CVE-2023/CVE-2023-527xx/CVE-2023-52722.json index 3d798df3e94..92f51bc064c 100644 --- a/CVE-2023/CVE-2023-527xx/CVE-2023-52722.json +++ b/CVE-2023/CVE-2023-527xx/CVE-2023-52722.json @@ -2,8 +2,9 @@ "id": "CVE-2023-52722", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-28T00:15:07.270", - "lastModified": "2024-04-29T12:42:03.667", + "lastModified": "2024-06-28T05:15:10.640", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -16,6 +17,10 @@ ], "metrics": {}, "references": [ + { + "url": "http://www.openwall.com/lists/oss-security/2024/06/28/2", + "source": "cve@mitre.org" + }, { "url": "https://cgit.ghostscript.com/cgi-bin/cgit.cgi/ghostpdl.git/commit/?id=afd7188f74918cb51b5fb89f52b54eb16e8acfd1", "source": "cve@mitre.org" diff --git a/CVE-2023/CVE-2023-528xx/CVE-2023-52892.json b/CVE-2023/CVE-2023-528xx/CVE-2023-52892.json index cbbeddcbae9..a006d98cd56 100644 --- a/CVE-2023/CVE-2023-528xx/CVE-2023-52892.json +++ b/CVE-2023/CVE-2023-528xx/CVE-2023-52892.json @@ -2,8 +2,9 @@ "id": "CVE-2023-52892", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-27T22:15:10.277", - "lastModified": "2024-06-27T22:15:10.277", - "vulnStatus": "Received", + "lastModified": "2024-06-28T10:27:00.920", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-13xx/CVE-2024-1330.json b/CVE-2024/CVE-2024-13xx/CVE-2024-1330.json index 1d2c10b62d0..bab6cefdb73 100644 --- a/CVE-2024/CVE-2024-13xx/CVE-2024-1330.json +++ b/CVE-2024/CVE-2024-13xx/CVE-2024-1330.json @@ -2,8 +2,9 @@ "id": "CVE-2024-1330", "sourceIdentifier": "contact@wpscan.com", "published": "2024-06-27T06:15:09.800", - "lastModified": "2024-06-27T12:47:19.847", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-06-28T13:30:35.033", + "vulnStatus": "Analyzed", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,11 +15,68 @@ "value": " El complemento de WordPress kadence-blocks-pro anterior a 2.3.8 no impide que los usuarios con al menos el rol de colaborador utilicen algunas de las funcionalidades de su c\u00f3digo corto para filtrar opciones arbitrarias de la base de datos." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:kadencewp:kadence_blocks_pro:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.3.8", + "matchCriteriaId": "9CF6F0F6-C4AB-4732-AB5F-F5DBCFDC4202" + } + ] + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/1988815b-7a53-4657-9b1c-1f83c9f9ccfd/", - "source": "contact@wpscan.com" + "source": "contact@wpscan.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-14xx/CVE-2024-1493.json b/CVE-2024/CVE-2024-14xx/CVE-2024-1493.json index d26524a966d..0bc31652cd4 100644 --- a/CVE-2024/CVE-2024-14xx/CVE-2024-1493.json +++ b/CVE-2024/CVE-2024-14xx/CVE-2024-1493.json @@ -2,8 +2,9 @@ "id": "CVE-2024-1493", "sourceIdentifier": "cve@gitlab.com", "published": "2024-06-27T00:15:10.283", - "lastModified": "2024-06-27T12:47:19.847", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-06-28T13:24:27.063", + "vulnStatus": "Analyzed", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -16,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + }, { "source": "cve@gitlab.com", "type": "Secondary", @@ -39,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-1333" + } + ] + }, { "source": "cve@gitlab.com", "type": "Secondary", @@ -50,14 +81,70 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*", + "versionStartIncluding": "9.2.0", + "versionEndExcluding": "16.11.5", + "matchCriteriaId": "094ACB9D-124C-49F8-A3D6-4DBFCC962BB9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*", + "versionStartIncluding": "9.2.0", + "versionEndExcluding": "16.11.5", + "matchCriteriaId": "3A3396AE-9030-4C02-955F-62A6AF04702A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*", + "versionStartIncluding": "17.0.0", + "versionEndExcluding": "17.0.3", + "matchCriteriaId": "541958DE-CB05-43D9-921B-4ADD2E436BF7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*", + "versionStartIncluding": "17.0.0", + "versionEndExcluding": "17.0.3", + "matchCriteriaId": "C987EC42-A56B-462A-A0CE-7417CC0FD414" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gitlab:gitlab:17.1.0:*:*:*:community:*:*:*", + "matchCriteriaId": "D2461A15-EA5F-43D1-B359-0F24713A713B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gitlab:gitlab:17.1.0:*:*:*:enterprise:*:*:*", + "matchCriteriaId": "9AA7835D-35E6-44D6-9194-2AC4C38961CE" + } + ] + } + ] + } + ], "references": [ { "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/441806", - "source": "cve@gitlab.com" + "source": "cve@gitlab.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://hackerone.com/reports/2370084", - "source": "cve@gitlab.com" + "source": "cve@gitlab.com", + "tags": [ + "Permissions Required" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-18xx/CVE-2024-1816.json b/CVE-2024/CVE-2024-18xx/CVE-2024-1816.json index bb1fd092fa1..e627eebbfb0 100644 --- a/CVE-2024/CVE-2024-18xx/CVE-2024-1816.json +++ b/CVE-2024/CVE-2024-18xx/CVE-2024-1816.json @@ -2,8 +2,9 @@ "id": "CVE-2024-1816", "sourceIdentifier": "cve@gitlab.com", "published": "2024-06-27T00:15:10.523", - "lastModified": "2024-06-27T12:47:19.847", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-06-28T13:23:54.380", + "vulnStatus": "Analyzed", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -16,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + }, { "source": "cve@gitlab.com", "type": "Secondary", @@ -39,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "cve@gitlab.com", "type": "Secondary", @@ -50,14 +81,70 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*", + "versionStartIncluding": "12.0", + "versionEndExcluding": "16.11.5", + "matchCriteriaId": "1A737EB9-758A-469C-B9DF-6B77CA39118A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*", + "versionStartIncluding": "12.0", + "versionEndExcluding": "16.11.5", + "matchCriteriaId": "928DC788-6A7F-4EE9-B57D-25C4806D9BA3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*", + "versionStartIncluding": "17.0.0", + "versionEndExcluding": "17.0.3", + "matchCriteriaId": "541958DE-CB05-43D9-921B-4ADD2E436BF7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*", + "versionStartIncluding": "17.0.0", + "versionEndExcluding": "17.0.3", + "matchCriteriaId": "C987EC42-A56B-462A-A0CE-7417CC0FD414" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gitlab:gitlab:17.1.0:*:*:*:community:*:*:*", + "matchCriteriaId": "D2461A15-EA5F-43D1-B359-0F24713A713B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gitlab:gitlab:17.1.0:*:*:*:enterprise:*:*:*", + "matchCriteriaId": "9AA7835D-35E6-44D6-9194-2AC4C38961CE" + } + ] + } + ] + } + ], "references": [ { "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/442852", - "source": "cve@gitlab.com" + "source": "cve@gitlab.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://hackerone.com/reports/2370737", - "source": "cve@gitlab.com" + "source": "cve@gitlab.com", + "tags": [ + "Permissions Required" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-21xx/CVE-2024-2191.json b/CVE-2024/CVE-2024-21xx/CVE-2024-2191.json index b6eb24bbffe..11ea0b0e4f6 100644 --- a/CVE-2024/CVE-2024-21xx/CVE-2024-2191.json +++ b/CVE-2024/CVE-2024-21xx/CVE-2024-2191.json @@ -2,8 +2,9 @@ "id": "CVE-2024-2191", "sourceIdentifier": "cve@gitlab.com", "published": "2024-06-27T00:15:10.790", - "lastModified": "2024-06-27T12:47:19.847", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-06-28T13:23:23.787", + "vulnStatus": "Analyzed", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -16,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + }, { "source": "cve@gitlab.com", "type": "Secondary", @@ -39,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "cve@gitlab.com", "type": "Secondary", @@ -50,14 +81,70 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*", + "versionStartIncluding": "16.9.0", + "versionEndExcluding": "16.11.5", + "matchCriteriaId": "1061CF50-3E72-4FEF-BCD4-9683B5AC2893" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*", + "versionStartIncluding": "16.9.0", + "versionEndExcluding": "16.11.5", + "matchCriteriaId": "A7C994DA-6CAF-4013-8FE6-C2FDD80071ED" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*", + "versionStartIncluding": "17.0.0", + "versionEndExcluding": "17.0.3", + "matchCriteriaId": "541958DE-CB05-43D9-921B-4ADD2E436BF7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*", + "versionStartIncluding": "17.0.0", + "versionEndExcluding": "17.0.3", + "matchCriteriaId": "C987EC42-A56B-462A-A0CE-7417CC0FD414" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gitlab:gitlab:17.1.0:*:*:*:community:*:*:*", + "matchCriteriaId": "D2461A15-EA5F-43D1-B359-0F24713A713B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gitlab:gitlab:17.1.0:*:*:*:enterprise:*:*:*", + "matchCriteriaId": "9AA7835D-35E6-44D6-9194-2AC4C38961CE" + } + ] + } + ] + } + ], "references": [ { "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/444655", - "source": "cve@gitlab.com" + "source": "cve@gitlab.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://hackerone.com/reports/2357370", - "source": "cve@gitlab.com" + "source": "cve@gitlab.com", + "tags": [ + "Permissions Required" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-222xx/CVE-2024-22260.json b/CVE-2024/CVE-2024-222xx/CVE-2024-22260.json index 5180190c23a..3767c666f81 100644 --- a/CVE-2024/CVE-2024-222xx/CVE-2024-22260.json +++ b/CVE-2024/CVE-2024-222xx/CVE-2024-22260.json @@ -2,8 +2,9 @@ "id": "CVE-2024-22260", "sourceIdentifier": "security@vmware.com", "published": "2024-06-27T21:15:13.470", - "lastModified": "2024-06-27T21:15:13.470", - "vulnStatus": "Received", + "lastModified": "2024-06-28T10:27:00.920", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-222xx/CVE-2024-22272.json b/CVE-2024/CVE-2024-222xx/CVE-2024-22272.json index 9514b2da56d..c8dd5a1c3ad 100644 --- a/CVE-2024/CVE-2024-222xx/CVE-2024-22272.json +++ b/CVE-2024/CVE-2024-222xx/CVE-2024-22272.json @@ -2,8 +2,9 @@ "id": "CVE-2024-22272", "sourceIdentifier": "security@vmware.com", "published": "2024-06-27T21:15:13.670", - "lastModified": "2024-06-27T21:15:13.670", - "vulnStatus": "Received", + "lastModified": "2024-06-28T10:27:00.920", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-222xx/CVE-2024-22276.json b/CVE-2024/CVE-2024-222xx/CVE-2024-22276.json index a5e0e2f91ef..b271a91a32a 100644 --- a/CVE-2024/CVE-2024-222xx/CVE-2024-22276.json +++ b/CVE-2024/CVE-2024-222xx/CVE-2024-22276.json @@ -2,8 +2,9 @@ "id": "CVE-2024-22276", "sourceIdentifier": "security@vmware.com", "published": "2024-06-27T21:15:13.860", - "lastModified": "2024-06-27T21:15:13.860", - "vulnStatus": "Received", + "lastModified": "2024-06-28T10:27:00.920", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-236xx/CVE-2024-23692.json b/CVE-2024/CVE-2024-236xx/CVE-2024-23692.json index e459c78c7a9..e7ff00dcfbb 100644 --- a/CVE-2024/CVE-2024-236xx/CVE-2024-23692.json +++ b/CVE-2024/CVE-2024-236xx/CVE-2024-23692.json @@ -2,8 +2,16 @@ "id": "CVE-2024-23692", "sourceIdentifier": "disclosure@vulncheck.com", "published": "2024-05-31T10:15:09.330", - "lastModified": "2024-06-07T17:15:50.027", + "lastModified": "2024-06-28T04:15:04.597", "vulnStatus": "Awaiting Analysis", + "cveTags": [ + { + "sourceIdentifier": "disclosure@vulncheck.com", + "tags": [ + "unsupported-when-assigned" + ] + } + ], "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-23xx/CVE-2024-2363.json b/CVE-2024/CVE-2024-23xx/CVE-2024-2363.json index 9ad618cc1ab..b06f59c6c1c 100644 --- a/CVE-2024/CVE-2024-23xx/CVE-2024-2363.json +++ b/CVE-2024/CVE-2024-23xx/CVE-2024-2363.json @@ -2,8 +2,16 @@ "id": "CVE-2024-2363", "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-10T23:15:54.153", - "lastModified": "2024-05-17T02:38:11.830", + "lastModified": "2024-06-28T02:15:03.630", "vulnStatus": "Awaiting Analysis", + "cveTags": [ + { + "sourceIdentifier": "cna@vuldb.com", + "tags": [ + "unsupported-when-assigned" + ] + } + ], "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-262xx/CVE-2024-26260.json b/CVE-2024/CVE-2024-262xx/CVE-2024-26260.json index 448fec0b9b6..ace217bddbd 100644 --- a/CVE-2024/CVE-2024-262xx/CVE-2024-26260.json +++ b/CVE-2024/CVE-2024-262xx/CVE-2024-26260.json @@ -2,8 +2,9 @@ "id": "CVE-2024-26260", "sourceIdentifier": "twcert@cert.org.tw", "published": "2024-02-15T03:15:34.833", - "lastModified": "2024-02-15T06:23:39.303", + "lastModified": "2024-06-28T02:15:03.190", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -51,6 +52,10 @@ } ], "references": [ + { + "url": "https://www.chtsecurity.com/news/e456f679-9091-4de4-8f78-9262d20d6a96", + "source": "twcert@cert.org.tw" + }, { "url": "https://www.twcert.org.tw/tw/cp-132-7673-688b7-1.html", "source": "twcert@cert.org.tw" diff --git a/CVE-2024/CVE-2024-262xx/CVE-2024-26261.json b/CVE-2024/CVE-2024-262xx/CVE-2024-26261.json index aaa3855bb86..91ec5857a29 100644 --- a/CVE-2024/CVE-2024-262xx/CVE-2024-26261.json +++ b/CVE-2024/CVE-2024-262xx/CVE-2024-26261.json @@ -2,8 +2,9 @@ "id": "CVE-2024-26261", "sourceIdentifier": "twcert@cert.org.tw", "published": "2024-02-15T03:15:35.083", - "lastModified": "2024-02-15T06:23:39.303", + "lastModified": "2024-06-28T02:15:03.423", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -51,6 +52,10 @@ } ], "references": [ + { + "url": "https://www.chtsecurity.com/news/e456f679-9091-4de4-8f78-9262d20d6a96", + "source": "twcert@cert.org.tw" + }, { "url": "https://www.twcert.org.tw/tw/cp-132-7674-bdb40-1.html", "source": "twcert@cert.org.tw" diff --git a/CVE-2024/CVE-2024-27xx/CVE-2024-2795.json b/CVE-2024/CVE-2024-27xx/CVE-2024-2795.json new file mode 100644 index 00000000000..ce1e05b3d42 --- /dev/null +++ b/CVE-2024/CVE-2024-27xx/CVE-2024-2795.json @@ -0,0 +1,48 @@ +{ + "id": "CVE-2024-2795", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-06-28T07:15:03.157", + "lastModified": "2024-06-28T10:27:00.920", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The SEO SIMPLE PACK plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 3.2.1 via META description. This makes it possible for unauthenticated attackers to extract limited information about password protected posts." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "references": [ + { + "url": "https://wordpress.org/plugins/seo-simple-pack/", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/f62a9ca0-7077-410f-b005-175348acd133?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-290xx/CVE-2024-29038.json b/CVE-2024/CVE-2024-290xx/CVE-2024-29038.json new file mode 100644 index 00000000000..84d419b63f7 --- /dev/null +++ b/CVE-2024/CVE-2024-290xx/CVE-2024-29038.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2024-29038", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-06-28T14:15:03.033", + "lastModified": "2024-06-28T14:15:03.033", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "tpm2-tools is the source repository for the Trusted Platform Module (TPM2.0) tools. A malicious attacker can generate arbitrary quote data which is not detected by `tpm2 checkquote`. This issue was patched in version 5.7." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.5, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1283" + }, + { + "lang": "en", + "value": "CWE-1390" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/tpm2-software/tpm2-tools/releases/tag/5.7", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/tpm2-software/tpm2-tools/security/advisories/GHSA-5495-c38w-gr6f", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-29xx/CVE-2024-2973.json b/CVE-2024/CVE-2024-29xx/CVE-2024-2973.json index 0b89387005c..d21844456ef 100644 --- a/CVE-2024/CVE-2024-29xx/CVE-2024-2973.json +++ b/CVE-2024/CVE-2024-29xx/CVE-2024-2973.json @@ -2,8 +2,9 @@ "id": "CVE-2024-2973", "sourceIdentifier": "sirt@juniper.net", "published": "2024-06-27T21:15:15.037", - "lastModified": "2024-06-27T21:15:15.037", - "vulnStatus": "Received", + "lastModified": "2024-06-28T10:27:00.920", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -11,6 +12,50 @@ } ], "metrics": { + "cvssMetricV40": [ + { + "source": "sirt@juniper.net", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:Y/R:X/V:C/RE:M/U:Red", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "HIGH", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "HIGH", + "subsequentSystemIntegrity": "HIGH", + "subsequentSystemAvailability": "HIGH", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "YES", + "recovery": "NOT_DEFINED", + "valueDensity": "CONCENTRATED", + "vulnerabilityResponseEffort": "MODERATE", + "providerUrgency": "RED", + "baseScore": 10.0, + "baseSeverity": "CRITICAL" + } + } + ], "cvssMetricV31": [ { "source": "sirt@juniper.net", diff --git a/CVE-2024/CVE-2024-301xx/CVE-2024-30109.json b/CVE-2024/CVE-2024-301xx/CVE-2024-30109.json new file mode 100644 index 00000000000..0559c6c66f2 --- /dev/null +++ b/CVE-2024/CVE-2024-301xx/CVE-2024-30109.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-30109", + "sourceIdentifier": "psirt@hcl.com", + "published": "2024-06-28T06:15:05.180", + "lastModified": "2024-06-28T10:27:00.920", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "HCL DRYiCE AEX is impacted by a lack of clickjacking protection in the AEX web application. An attacker can use multiple transparent or opaque layers to trick a user into clicking on a button or link on another page than the one intended." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@hcl.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 3.7, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 2.2, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@hcl.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1021" + } + ] + } + ], + "references": [ + { + "url": "https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0114193", + "source": "psirt@hcl.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-301xx/CVE-2024-30110.json b/CVE-2024/CVE-2024-301xx/CVE-2024-30110.json new file mode 100644 index 00000000000..554f0070b70 --- /dev/null +++ b/CVE-2024/CVE-2024-301xx/CVE-2024-30110.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-30110", + "sourceIdentifier": "psirt@hcl.com", + "published": "2024-06-28T07:15:05.077", + "lastModified": "2024-06-28T10:27:00.920", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "HCL DRYiCE\nAEX product is impacted by lack of input validation vulnerability in a particular web application. A malicious script can be injected into a system which\ncan cause the system to behave in unexpected ways." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@hcl.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 3.7, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 2.2, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@hcl.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] + } + ], + "references": [ + { + "url": "https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0114193", + "source": "psirt@hcl.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-301xx/CVE-2024-30111.json b/CVE-2024/CVE-2024-301xx/CVE-2024-30111.json new file mode 100644 index 00000000000..755410d8b46 --- /dev/null +++ b/CVE-2024/CVE-2024-301xx/CVE-2024-30111.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-30111", + "sourceIdentifier": "psirt@hcl.com", + "published": "2024-06-28T07:15:05.473", + "lastModified": "2024-06-28T10:27:00.920", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "HCL DRYiCE AEX product is impacted by Missing\nRoot Detection vulnerability in the mobile application. The mobile app can be installed in the rooted\ndevice due to which malicious users can gain unauthorized access to the rooted\ndevices, compromising security and potentially leading to data breaches or\nother malicious activities." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@hcl.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 3.3, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 1.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@hcl.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1326" + } + ] + } + ], + "references": [ + { + "url": "https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0114193", + "source": "psirt@hcl.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-301xx/CVE-2024-30135.json b/CVE-2024/CVE-2024-301xx/CVE-2024-30135.json new file mode 100644 index 00000000000..dc6bcea5996 --- /dev/null +++ b/CVE-2024/CVE-2024-301xx/CVE-2024-30135.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-30135", + "sourceIdentifier": "psirt@hcl.com", + "published": "2024-06-28T08:15:02.590", + "lastModified": "2024-06-28T10:27:00.920", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "HCL DRYiCE AEX is potentially impacted by disclosure of sensitive information in the mobile application when a snapshot is taken." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@hcl.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 3.3, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 1.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@hcl.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], + "references": [ + { + "url": "https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0114193", + "source": "psirt@hcl.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-318xx/CVE-2024-31802.json b/CVE-2024/CVE-2024-318xx/CVE-2024-31802.json index 9f0cdb9b6ba..4e69f84d471 100644 --- a/CVE-2024/CVE-2024-318xx/CVE-2024-31802.json +++ b/CVE-2024/CVE-2024-318xx/CVE-2024-31802.json @@ -2,8 +2,9 @@ "id": "CVE-2024-31802", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-27T20:15:21.480", - "lastModified": "2024-06-27T20:15:21.480", - "vulnStatus": "Received", + "lastModified": "2024-06-28T10:27:00.920", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-31xx/CVE-2024-3111.json b/CVE-2024/CVE-2024-31xx/CVE-2024-3111.json index 554eb085c83..83865f56927 100644 --- a/CVE-2024/CVE-2024-31xx/CVE-2024-3111.json +++ b/CVE-2024/CVE-2024-31xx/CVE-2024-3111.json @@ -2,8 +2,9 @@ "id": "CVE-2024-3111", "sourceIdentifier": "contact@wpscan.com", "published": "2024-06-27T06:15:11.643", - "lastModified": "2024-06-27T12:47:19.847", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-06-28T13:28:47.937", + "vulnStatus": "Analyzed", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,11 +15,68 @@ "value": "El complemento de WordPress Interactive Content anterior a la versi\u00f3n 1.15.8 no valida las cargas, lo que podr\u00eda permitir a los contribuyentes y superiores actualizar archivos SVG maliciosos, lo que genera problemas de Cross-Site Scripting Almacenado." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:h5p:h5p:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.15.8", + "matchCriteriaId": "9BBDFE4F-C130-4B3F-8AEB-9134781DEFEB" + } + ] + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/7c39f3b5-d407-4eb0-aa34-b498fe196c55/", - "source": "contact@wpscan.com" + "source": "contact@wpscan.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-31xx/CVE-2024-3115.json b/CVE-2024/CVE-2024-31xx/CVE-2024-3115.json index 2268c527d66..07b627bdb42 100644 --- a/CVE-2024/CVE-2024-31xx/CVE-2024-3115.json +++ b/CVE-2024/CVE-2024-31xx/CVE-2024-3115.json @@ -2,8 +2,9 @@ "id": "CVE-2024-3115", "sourceIdentifier": "cve@gitlab.com", "published": "2024-06-27T00:15:11.190", - "lastModified": "2024-06-27T12:47:19.847", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-06-28T13:22:33.400", + "vulnStatus": "Analyzed", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -16,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + }, { "source": "cve@gitlab.com", "type": "Secondary", @@ -39,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + }, { "source": "cve@gitlab.com", "type": "Secondary", @@ -50,14 +81,70 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*", + "versionStartIncluding": "16.0.0", + "versionEndExcluding": "16.11.5", + "matchCriteriaId": "F8DBE1E2-2B13-46C1-B72F-EEF32FFBF0B6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*", + "versionStartIncluding": "16.0.0", + "versionEndExcluding": "16.11.5", + "matchCriteriaId": "26302281-02B6-4066-847C-643B4A30602B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*", + "versionStartIncluding": "17.0.0", + "versionEndExcluding": "17.0.3", + "matchCriteriaId": "541958DE-CB05-43D9-921B-4ADD2E436BF7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*", + "versionStartIncluding": "17.0.0", + "versionEndExcluding": "17.0.3", + "matchCriteriaId": "C987EC42-A56B-462A-A0CE-7417CC0FD414" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gitlab:gitlab:17.1.0:*:*:*:community:*:*:*", + "matchCriteriaId": "D2461A15-EA5F-43D1-B359-0F24713A713B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gitlab:gitlab:17.1.0:*:*:*:enterprise:*:*:*", + "matchCriteriaId": "9AA7835D-35E6-44D6-9194-2AC4C38961CE" + } + ] + } + ] + } + ], "references": [ { "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/452548", - "source": "cve@gitlab.com" + "source": "cve@gitlab.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://hackerone.com/reports/2417868", - "source": "cve@gitlab.com" + "source": "cve@gitlab.com", + "tags": [ + "Permissions Required" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-360xx/CVE-2024-36059.json b/CVE-2024/CVE-2024-360xx/CVE-2024-36059.json index 35617c6f44f..bb627512dbb 100644 --- a/CVE-2024/CVE-2024-360xx/CVE-2024-36059.json +++ b/CVE-2024/CVE-2024-360xx/CVE-2024-36059.json @@ -2,8 +2,9 @@ "id": "CVE-2024-36059", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-27T22:15:10.437", - "lastModified": "2024-06-27T22:15:10.437", - "vulnStatus": "Received", + "lastModified": "2024-06-28T10:27:00.920", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-360xx/CVE-2024-36072.json b/CVE-2024/CVE-2024-360xx/CVE-2024-36072.json index a22ef29bd40..be944243849 100644 --- a/CVE-2024/CVE-2024-360xx/CVE-2024-36072.json +++ b/CVE-2024/CVE-2024-360xx/CVE-2024-36072.json @@ -2,8 +2,9 @@ "id": "CVE-2024-36072", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-27T21:15:15.327", - "lastModified": "2024-06-27T21:15:15.327", - "vulnStatus": "Received", + "lastModified": "2024-06-28T10:27:00.920", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-360xx/CVE-2024-36073.json b/CVE-2024/CVE-2024-360xx/CVE-2024-36073.json index 557431e75a4..7226c162223 100644 --- a/CVE-2024/CVE-2024-360xx/CVE-2024-36073.json +++ b/CVE-2024/CVE-2024-360xx/CVE-2024-36073.json @@ -2,8 +2,9 @@ "id": "CVE-2024-36073", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-27T21:15:15.420", - "lastModified": "2024-06-27T21:15:15.420", - "vulnStatus": "Received", + "lastModified": "2024-06-28T10:27:00.920", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-360xx/CVE-2024-36074.json b/CVE-2024/CVE-2024-360xx/CVE-2024-36074.json index 642fe1c24e8..f6a28d1e90a 100644 --- a/CVE-2024/CVE-2024-360xx/CVE-2024-36074.json +++ b/CVE-2024/CVE-2024-360xx/CVE-2024-36074.json @@ -2,8 +2,9 @@ "id": "CVE-2024-36074", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-27T21:15:15.520", - "lastModified": "2024-06-27T21:15:15.520", - "vulnStatus": "Received", + "lastModified": "2024-06-28T10:27:00.920", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-360xx/CVE-2024-36075.json b/CVE-2024/CVE-2024-360xx/CVE-2024-36075.json index 88d07dd0b98..b341dde1e4b 100644 --- a/CVE-2024/CVE-2024-360xx/CVE-2024-36075.json +++ b/CVE-2024/CVE-2024-360xx/CVE-2024-36075.json @@ -2,8 +2,9 @@ "id": "CVE-2024-36075", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-27T21:15:15.610", - "lastModified": "2024-06-27T21:15:15.610", - "vulnStatus": "Received", + "lastModified": "2024-06-28T10:27:00.920", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-367xx/CVE-2024-36755.json b/CVE-2024/CVE-2024-367xx/CVE-2024-36755.json index 512ef3aca78..845670205b6 100644 --- a/CVE-2024/CVE-2024-367xx/CVE-2024-36755.json +++ b/CVE-2024/CVE-2024-367xx/CVE-2024-36755.json @@ -2,8 +2,9 @@ "id": "CVE-2024-36755", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-27T21:15:15.700", - "lastModified": "2024-06-27T21:15:15.700", - "vulnStatus": "Received", + "lastModified": "2024-06-28T10:27:00.920", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-371xx/CVE-2024-37107.json b/CVE-2024/CVE-2024-371xx/CVE-2024-37107.json index c44fa01d634..7660ba53aa6 100644 --- a/CVE-2024/CVE-2024-371xx/CVE-2024-37107.json +++ b/CVE-2024/CVE-2024-371xx/CVE-2024-37107.json @@ -2,12 +2,17 @@ "id": "CVE-2024-37107", "sourceIdentifier": "audit@patchstack.com", "published": "2024-06-24T13:15:10.247", - "lastModified": "2024-06-24T19:26:54.367", + "lastModified": "2024-06-28T13:15:02.503", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", - "value": "Improper Privilege Management vulnerability in Membership Software WishList Member X allows Privilege Escalation.This issue affects WishList Member X: from n/a through 3.25.1." + "value": "Improper Privilege Management vulnerability in Membership Software WishList Member X allows Privilege Escalation.This issue affects WishList Member X: from n/a before 3.26.7." + }, + { + "lang": "es", + "value": "Vulnerabilidad de gesti\u00f3n de privilegios inadecuada en el software de membres\u00eda WishList Member X permite la escalada de privilegios. Este problema afecta a WishList Member X: desde n/a hasta 3.25.1." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-371xx/CVE-2024-37109.json b/CVE-2024/CVE-2024-371xx/CVE-2024-37109.json index a48990e2e83..b60dde3c243 100644 --- a/CVE-2024/CVE-2024-371xx/CVE-2024-37109.json +++ b/CVE-2024/CVE-2024-371xx/CVE-2024-37109.json @@ -2,12 +2,17 @@ "id": "CVE-2024-37109", "sourceIdentifier": "audit@patchstack.com", "published": "2024-06-24T13:15:10.483", - "lastModified": "2024-06-24T19:26:47.037", + "lastModified": "2024-06-28T13:15:02.650", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", - "value": "Improper Control of Generation of Code ('Code Injection') vulnerability in Membership Software WishList Member X allows Code Injection.This issue affects WishList Member X: from n/a through 3.25.1." + "value": "Improper Control of Generation of Code ('Code Injection') vulnerability in Membership Software WishList Member X allows Code Injection.This issue affects WishList Member X: from n/a before 3.26.7." + }, + { + "lang": "es", + "value": "Vulnerabilidad de control inadecuado de la generaci\u00f3n de c\u00f3digo (\"inyecci\u00f3n de c\u00f3digo\") en el software de membres\u00eda WishList Member X permite la inyecci\u00f3n de c\u00f3digo. Este problema afecta a WishList Member X: desde n/a hasta 3.25.1." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-371xx/CVE-2024-37111.json b/CVE-2024/CVE-2024-371xx/CVE-2024-37111.json index 3c921d3d11a..9e81307f2c7 100644 --- a/CVE-2024/CVE-2024-371xx/CVE-2024-37111.json +++ b/CVE-2024/CVE-2024-371xx/CVE-2024-37111.json @@ -2,12 +2,17 @@ "id": "CVE-2024-37111", "sourceIdentifier": "audit@patchstack.com", "published": "2024-06-24T13:15:10.720", - "lastModified": "2024-06-24T19:26:47.037", + "lastModified": "2024-06-28T13:15:02.750", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", - "value": "Missing Authorization vulnerability in Membership Software WishList Member X.This issue affects WishList Member X: from n/a through 3.25.1." + "value": "Missing Authorization vulnerability in Membership Software WishList Member X.This issue affects WishList Member X: from n/a before 3.26.7." + }, + { + "lang": "es", + "value": "Vulnerabilidad de autorizaci\u00f3n faltante en el software de membres\u00eda WishList Member X. Este problema afecta a WishList Member X: desde n/a hasta 3.25.1." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-371xx/CVE-2024-37137.json b/CVE-2024/CVE-2024-371xx/CVE-2024-37137.json new file mode 100644 index 00000000000..1fc77b3cd45 --- /dev/null +++ b/CVE-2024/CVE-2024-371xx/CVE-2024-37137.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-37137", + "sourceIdentifier": "security_alert@emc.com", + "published": "2024-06-28T02:15:03.780", + "lastModified": "2024-06-28T10:27:00.920", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Dell Key Trust Platform, v3.0.6 and prior, contains Use of a Cryptographic Primitive with a Risky Implementation vulnerability. A local privileged attacker could potentially exploit this vulnerability, leading to privileged information disclosure." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security_alert@emc.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:L", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 3.8, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 0.3, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "security_alert@emc.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-1240" + } + ] + } + ], + "references": [ + { + "url": "https://www.dell.com/support/kbdoc/en-us/000226476/dsa-2024-294-security-update-for-dell-cloudlink-vulnerability", + "source": "security_alert@emc.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-372xx/CVE-2024-37282.json b/CVE-2024/CVE-2024-372xx/CVE-2024-37282.json new file mode 100644 index 00000000000..1cd190fd1e7 --- /dev/null +++ b/CVE-2024/CVE-2024-372xx/CVE-2024-37282.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-37282", + "sourceIdentifier": "bressers@elastic.co", + "published": "2024-06-28T05:15:11.633", + "lastModified": "2024-06-28T10:27:00.920", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "It was identified that under certain specific preconditions, an API key that was originally created with a specific privileges could be subsequently used to create new API keys that have elevated privileges." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "bressers@elastic.co", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "bressers@elastic.co", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-285" + } + ] + } + ], + "references": [ + { + "url": "https://discuss.elastic.co/t/elastic-cloud-enterprise-3-7-2-security-update-esa-2024-18/362181", + "source": "bressers@elastic.co" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-377xx/CVE-2024-37741.json b/CVE-2024/CVE-2024-377xx/CVE-2024-37741.json new file mode 100644 index 00000000000..68d2c06b850 --- /dev/null +++ b/CVE-2024/CVE-2024-377xx/CVE-2024-37741.json @@ -0,0 +1,29 @@ +{ + "id": "CVE-2024-37741", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-06-28T13:15:02.860", + "lastModified": "2024-06-28T13:38:47.077", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "OpenPLC 3 through 9cd8f1b allows XSS via an SVG document as a profile picture." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://1d8.github.io/cves/cve_2024_37741/", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/thiagoralves/OpenPLC_v3/blob/9cd8f1b53a50f9d38708096bfc72bcbb1ef47343/webserver/pages.py#L992", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/thiagoralves/OpenPLC_v3/issues/242", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-385xx/CVE-2024-38523.json b/CVE-2024/CVE-2024-385xx/CVE-2024-38523.json index f6eea4996b3..02d031929d5 100644 --- a/CVE-2024/CVE-2024-385xx/CVE-2024-38523.json +++ b/CVE-2024/CVE-2024-385xx/CVE-2024-38523.json @@ -2,8 +2,9 @@ "id": "CVE-2024-38523", "sourceIdentifier": "security-advisories@github.com", "published": "2024-06-27T20:15:22.003", - "lastModified": "2024-06-27T20:15:22.003", - "vulnStatus": "Received", + "lastModified": "2024-06-28T10:27:00.920", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-385xx/CVE-2024-38531.json b/CVE-2024/CVE-2024-385xx/CVE-2024-38531.json new file mode 100644 index 00000000000..4f6bc2a5cb0 --- /dev/null +++ b/CVE-2024/CVE-2024-385xx/CVE-2024-38531.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-38531", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-06-28T14:15:03.293", + "lastModified": "2024-06-28T14:15:03.293", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Nix is a package manager for Linux and other Unix systems that makes package management reliable and reproducible. A build process has access to and can change the permissions of the build directory. After creating a setuid binary in a globally accessible location, a malicious local user can assume the permissions of a Nix daemon worker and hijack all future builds. This issue was patched in version(s) 2.23.1, 2.22.2, 2.21.3, 2.20.7, 2.19.5 and 2.18.4." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 3.6, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 1.0, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-278" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/NixOS/nix/pull/10501", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/NixOS/nix/security/advisories/GHSA-q82p-44mg-mgh5", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-38xx/CVE-2024-3800.json b/CVE-2024/CVE-2024-38xx/CVE-2024-3800.json new file mode 100644 index 00000000000..cfcfc93bc33 --- /dev/null +++ b/CVE-2024/CVE-2024-38xx/CVE-2024-3800.json @@ -0,0 +1,37 @@ +{ + "id": "CVE-2024-3800", + "sourceIdentifier": "cvd@cert.pl", + "published": "2024-06-28T13:15:02.990", + "lastModified": "2024-06-28T13:38:47.077", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Sites managed in S@M CMS (Concept Intermedia) might be vulnerable to Reflected XSS\u00a0via including scripts in requested file names.\u00a0\nOnly a part of observed services is vulnerable, but since vendor has not investigated the root problem, it is hard to determine when the issue appears." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "cvd@cert.pl", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://cert.pl/en/posts/2024/06/CVE-2024-3800", + "source": "cvd@cert.pl" + }, + { + "url": "https://cert.pl/posts/2024/06/CVE-2024-3800", + "source": "cvd@cert.pl" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-38xx/CVE-2024-3801.json b/CVE-2024/CVE-2024-38xx/CVE-2024-3801.json new file mode 100644 index 00000000000..ada3f2d0b04 --- /dev/null +++ b/CVE-2024/CVE-2024-38xx/CVE-2024-3801.json @@ -0,0 +1,37 @@ +{ + "id": "CVE-2024-3801", + "sourceIdentifier": "cvd@cert.pl", + "published": "2024-06-28T13:15:03.157", + "lastModified": "2024-06-28T13:38:47.077", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Sites managed in S@M CMS (Concept Intermedia) might be vulnerable to Reflected XSS\u00a0via including scripts in one of GET header parameters.\u00a0\nOnly a part of observed services is vulnerable, but since vendor has not investigated the root problem, it is hard to determine when the issue appears." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "cvd@cert.pl", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://cert.pl/en/posts/2024/06/CVE-2024-3800", + "source": "cvd@cert.pl" + }, + { + "url": "https://cert.pl/posts/2024/06/CVE-2024-3800", + "source": "cvd@cert.pl" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-38xx/CVE-2024-3816.json b/CVE-2024/CVE-2024-38xx/CVE-2024-3816.json new file mode 100644 index 00000000000..ecee2d328bd --- /dev/null +++ b/CVE-2024/CVE-2024-38xx/CVE-2024-3816.json @@ -0,0 +1,37 @@ +{ + "id": "CVE-2024-3816", + "sourceIdentifier": "cvd@cert.pl", + "published": "2024-06-28T13:15:03.283", + "lastModified": "2024-06-28T13:38:47.077", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Sites managed in S@M CMS (Concept Intermedia) might be vulnerable to a blind SQL Injection executed using the search bar.\u00a0\nOnly a part of observed services is vulnerable, but since vendor has not investigated the root problem, it is hard to determine when the issue appears." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "cvd@cert.pl", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://cert.pl/en/posts/2024/06/CVE-2024-3800", + "source": "cvd@cert.pl" + }, + { + "url": "https://cert.pl/posts/2024/06/CVE-2024-3800", + "source": "cvd@cert.pl" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-391xx/CVE-2024-39129.json b/CVE-2024/CVE-2024-391xx/CVE-2024-39129.json index d86f71ac8e7..1706f87f64a 100644 --- a/CVE-2024/CVE-2024-391xx/CVE-2024-39129.json +++ b/CVE-2024/CVE-2024-391xx/CVE-2024-39129.json @@ -2,8 +2,9 @@ "id": "CVE-2024-39129", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-27T20:15:22.277", - "lastModified": "2024-06-27T20:15:22.277", - "vulnStatus": "Received", + "lastModified": "2024-06-28T10:27:00.920", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-391xx/CVE-2024-39130.json b/CVE-2024/CVE-2024-391xx/CVE-2024-39130.json index 04835e6cf2b..67f733ddfa2 100644 --- a/CVE-2024/CVE-2024-391xx/CVE-2024-39130.json +++ b/CVE-2024/CVE-2024-391xx/CVE-2024-39130.json @@ -2,8 +2,9 @@ "id": "CVE-2024-39130", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-27T20:15:22.370", - "lastModified": "2024-06-27T20:15:22.370", - "vulnStatus": "Received", + "lastModified": "2024-06-28T10:27:00.920", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-391xx/CVE-2024-39132.json b/CVE-2024/CVE-2024-391xx/CVE-2024-39132.json index a05085a3fb6..fe695aa387e 100644 --- a/CVE-2024/CVE-2024-391xx/CVE-2024-39132.json +++ b/CVE-2024/CVE-2024-391xx/CVE-2024-39132.json @@ -2,8 +2,9 @@ "id": "CVE-2024-39132", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-27T21:15:15.790", - "lastModified": "2024-06-27T21:15:15.790", - "vulnStatus": "Received", + "lastModified": "2024-06-28T10:27:00.920", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-391xx/CVE-2024-39133.json b/CVE-2024/CVE-2024-391xx/CVE-2024-39133.json index e69a6f98e71..23cd4c4398b 100644 --- a/CVE-2024/CVE-2024-391xx/CVE-2024-39133.json +++ b/CVE-2024/CVE-2024-391xx/CVE-2024-39133.json @@ -2,8 +2,9 @@ "id": "CVE-2024-39133", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-27T20:15:22.463", - "lastModified": "2024-06-27T20:15:22.463", - "vulnStatus": "Received", + "lastModified": "2024-06-28T10:27:00.920", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-391xx/CVE-2024-39134.json b/CVE-2024/CVE-2024-391xx/CVE-2024-39134.json index e413b5f9888..1313b005ee8 100644 --- a/CVE-2024/CVE-2024-391xx/CVE-2024-39134.json +++ b/CVE-2024/CVE-2024-391xx/CVE-2024-39134.json @@ -2,8 +2,9 @@ "id": "CVE-2024-39134", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-27T21:15:15.883", - "lastModified": "2024-06-27T21:15:15.883", - "vulnStatus": "Received", + "lastModified": "2024-06-28T10:27:00.920", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-392xx/CVE-2024-39207.json b/CVE-2024/CVE-2024-392xx/CVE-2024-39207.json index 7a1d8cc2891..27d5c9745e1 100644 --- a/CVE-2024/CVE-2024-392xx/CVE-2024-39207.json +++ b/CVE-2024/CVE-2024-392xx/CVE-2024-39207.json @@ -2,8 +2,9 @@ "id": "CVE-2024-39207", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-27T20:15:22.557", - "lastModified": "2024-06-27T20:15:22.557", - "vulnStatus": "Received", + "lastModified": "2024-06-28T10:27:00.920", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-392xx/CVE-2024-39208.json b/CVE-2024/CVE-2024-392xx/CVE-2024-39208.json index 9b022f10948..2306187337e 100644 --- a/CVE-2024/CVE-2024-392xx/CVE-2024-39208.json +++ b/CVE-2024/CVE-2024-392xx/CVE-2024-39208.json @@ -2,8 +2,9 @@ "id": "CVE-2024-39208", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-27T20:15:22.650", - "lastModified": "2024-06-27T20:15:22.650", - "vulnStatus": "Received", + "lastModified": "2024-06-28T10:27:00.920", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-392xx/CVE-2024-39209.json b/CVE-2024/CVE-2024-392xx/CVE-2024-39209.json index 21774781c37..66f76e4bdec 100644 --- a/CVE-2024/CVE-2024-392xx/CVE-2024-39209.json +++ b/CVE-2024/CVE-2024-392xx/CVE-2024-39209.json @@ -2,8 +2,9 @@ "id": "CVE-2024-39209", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-27T21:15:15.980", - "lastModified": "2024-06-27T21:15:15.980", - "vulnStatus": "Received", + "lastModified": "2024-06-28T10:27:00.920", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-393xx/CVE-2024-39347.json b/CVE-2024/CVE-2024-393xx/CVE-2024-39347.json new file mode 100644 index 00000000000..98b7d92640f --- /dev/null +++ b/CVE-2024/CVE-2024-393xx/CVE-2024-39347.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-39347", + "sourceIdentifier": "security@synology.com", + "published": "2024-06-28T07:15:05.743", + "lastModified": "2024-06-28T10:27:00.920", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Incorrect default permissions vulnerability in firewall functionality in Synology Router Manager (SRM) before 1.2.5-8227-11 and 1.3.1-9346-8 allows man-in-the-middle attackers to access highly sensitive intranet resources via unspecified vectors." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@synology.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.2, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "security@synology.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-276" + } + ] + } + ], + "references": [ + { + "url": "https://www.synology.com/en-global/security/advisory/Synology_SA_23_16", + "source": "security@synology.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-393xx/CVE-2024-39348.json b/CVE-2024/CVE-2024-393xx/CVE-2024-39348.json new file mode 100644 index 00000000000..b4c60239b89 --- /dev/null +++ b/CVE-2024/CVE-2024-393xx/CVE-2024-39348.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-39348", + "sourceIdentifier": "security@synology.com", + "published": "2024-06-28T07:15:06.043", + "lastModified": "2024-06-28T10:27:00.920", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Download of code without integrity check vulnerability in AirPrint functionality in Synology Router Manager (SRM) before 1.2.5-8227-11 and 1.3.1-9346-8 allows man-in-the-middle attackers to execute arbitrary code via unspecified vectors." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@synology.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "security@synology.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-494" + } + ] + } + ], + "references": [ + { + "url": "https://www.synology.com/en-global/security/advisory/Synology_SA_23_16", + "source": "security@synology.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-393xx/CVE-2024-39349.json b/CVE-2024/CVE-2024-393xx/CVE-2024-39349.json new file mode 100644 index 00000000000..7d6a007e77d --- /dev/null +++ b/CVE-2024/CVE-2024-393xx/CVE-2024-39349.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-39349", + "sourceIdentifier": "security@synology.com", + "published": "2024-06-28T06:15:05.500", + "lastModified": "2024-06-28T10:27:00.920", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability regarding buffer copy without checking size of input ('Classic Buffer Overflow') is found in the libjansson component and it does not affect the upstream library. This allows remote attackers to execute arbitrary code via unspecified vectors. The following models with Synology Camera Firmware versions before 1.0.7-0298 may be affected: BC500 and TC500." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@synology.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "security@synology.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], + "references": [ + { + "url": "https://www.synology.com/en-global/security/advisory/Synology_SA_23_15", + "source": "security@synology.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-393xx/CVE-2024-39350.json b/CVE-2024/CVE-2024-393xx/CVE-2024-39350.json new file mode 100644 index 00000000000..1b1f189cbf8 --- /dev/null +++ b/CVE-2024/CVE-2024-393xx/CVE-2024-39350.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-39350", + "sourceIdentifier": "security@synology.com", + "published": "2024-06-28T07:15:06.330", + "lastModified": "2024-06-28T10:27:00.920", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability regarding authentication bypass by spoofing is found in the RTSP functionality. This allows man-in-the-middle attackers to obtain privileges without consent via unspecified vectors. The following models with Synology Camera Firmware versions before 1.0.7-0298 may be affected: BC500 and TC500." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@synology.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "security@synology.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-290" + } + ] + } + ], + "references": [ + { + "url": "https://www.synology.com/en-global/security/advisory/Synology_SA_23_15", + "source": "security@synology.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-393xx/CVE-2024-39351.json b/CVE-2024/CVE-2024-393xx/CVE-2024-39351.json new file mode 100644 index 00000000000..98580b1b394 --- /dev/null +++ b/CVE-2024/CVE-2024-393xx/CVE-2024-39351.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-39351", + "sourceIdentifier": "security@synology.com", + "published": "2024-06-28T06:15:05.887", + "lastModified": "2024-06-28T10:27:00.920", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability regarding improper neutralization of special elements used in an OS command ('OS Command Injection') is found in the NTP configuration. This allows remote authenticated users with administrator privileges to execute arbitrary commands via unspecified vectors. The following models with Synology Camera Firmware versions before 1.0.7-0298 may be affected: BC500 and TC500." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@synology.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "security@synology.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], + "references": [ + { + "url": "https://www.synology.com/en-global/security/advisory/Synology_SA_23_15", + "source": "security@synology.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-393xx/CVE-2024-39352.json b/CVE-2024/CVE-2024-393xx/CVE-2024-39352.json new file mode 100644 index 00000000000..1ebe993cf33 --- /dev/null +++ b/CVE-2024/CVE-2024-393xx/CVE-2024-39352.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-39352", + "sourceIdentifier": "security@synology.com", + "published": "2024-06-28T06:15:06.223", + "lastModified": "2024-06-28T10:27:00.920", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability regarding incorrect authorization is found in the firmware upgrade functionality. This allows remote authenticated users with administrator privileges to bypass firmware integrity check via unspecified vectors. The following models with Synology Camera Firmware versions before 1.0.7-0298 may be affected: BC500 and TC500." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@synology.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 4.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "security@synology.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] + } + ], + "references": [ + { + "url": "https://www.synology.com/en-global/security/advisory/Synology_SA_23_15", + "source": "security@synology.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-397xx/CVE-2024-39704.json b/CVE-2024/CVE-2024-397xx/CVE-2024-39704.json new file mode 100644 index 00000000000..ee6c073ab43 --- /dev/null +++ b/CVE-2024/CVE-2024-397xx/CVE-2024-39704.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-39704", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-06-28T13:15:02.927", + "lastModified": "2024-06-28T13:38:47.077", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Soft Circle French-Bread Melty Blood: Actress Again: Current Code through 1.07 Rev. 1.4.0 allows a remote attacker to execute arbitrary code on a client's machine via a crafted packet on TCP port 46318." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/MikeIsAStar/Melty-Blood-Actress-Again-Current-Code-Remote-Code-Execution", + "source": "cve@mitre.org" + }, + { + "url": "https://pastebin.com/agpnQmhu", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-397xx/CVE-2024-39705.json b/CVE-2024/CVE-2024-397xx/CVE-2024-39705.json index 16b8165de88..b6df45bbd94 100644 --- a/CVE-2024/CVE-2024-397xx/CVE-2024-39705.json +++ b/CVE-2024/CVE-2024-397xx/CVE-2024-39705.json @@ -2,8 +2,9 @@ "id": "CVE-2024-39705", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-27T22:15:10.543", - "lastModified": "2024-06-27T22:15:10.543", - "vulnStatus": "Received", + "lastModified": "2024-06-28T10:27:00.920", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-397xx/CVE-2024-39708.json b/CVE-2024/CVE-2024-397xx/CVE-2024-39708.json new file mode 100644 index 00000000000..231a32b7551 --- /dev/null +++ b/CVE-2024/CVE-2024-397xx/CVE-2024-39708.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2024-39708", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-06-28T01:15:08.793", + "lastModified": "2024-06-28T10:27:00.920", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An issue was discovered in the Agent in Delinea Privilege Manager (formerly Thycotic Privilege Manager) before 12.0.1096 on Windows. Sometimes, a non-administrator user can copy a crafted DLL file to a temporary directory (used by .NET Shadow Copies) such that privilege escalation can occur if the core agent service loads that file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve@mitre.org", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.0, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.0, + "impactScore": 5.9 + } + ] + }, + "references": [ + { + "url": "https://docs.delinea.com/online-help/privilege-manager/release-notes/12.0.1-combined.htm", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-39xx/CVE-2024-3959.json b/CVE-2024/CVE-2024-39xx/CVE-2024-3959.json index 5133ae77352..9df6f589568 100644 --- a/CVE-2024/CVE-2024-39xx/CVE-2024-3959.json +++ b/CVE-2024/CVE-2024-39xx/CVE-2024-3959.json @@ -2,8 +2,9 @@ "id": "CVE-2024-3959", "sourceIdentifier": "cve@gitlab.com", "published": "2024-06-27T00:15:11.420", - "lastModified": "2024-06-27T12:47:19.847", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-06-28T13:21:52.223", + "vulnStatus": "Analyzed", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -16,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + }, { "source": "cve@gitlab.com", "type": "Secondary", @@ -39,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "cve@gitlab.com", "type": "Secondary", @@ -50,14 +81,70 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*", + "versionStartIncluding": "16.7.0", + "versionEndExcluding": "16.11.5", + "matchCriteriaId": "0CD089FD-D42B-4F0E-A2D6-FE17E11B825B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*", + "versionStartIncluding": "16.7.0", + "versionEndExcluding": "16.11.5", + "matchCriteriaId": "6E74ABAD-3FC5-44B9-88DF-1EBE0C569C33" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*", + "versionStartIncluding": "17.0.0", + "versionEndExcluding": "17.0.3", + "matchCriteriaId": "541958DE-CB05-43D9-921B-4ADD2E436BF7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*", + "versionStartIncluding": "17.0.0", + "versionEndExcluding": "17.0.3", + "matchCriteriaId": "C987EC42-A56B-462A-A0CE-7417CC0FD414" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gitlab:gitlab:17.1.0:*:*:*:community:*:*:*", + "matchCriteriaId": "D2461A15-EA5F-43D1-B359-0F24713A713B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gitlab:gitlab:17.1.0:*:*:*:enterprise:*:*:*", + "matchCriteriaId": "9AA7835D-35E6-44D6-9194-2AC4C38961CE" + } + ] + } + ] + } + ], "references": [ { "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/456989", - "source": "cve@gitlab.com" + "source": "cve@gitlab.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://hackerone.com/reports/2456845", - "source": "cve@gitlab.com" + "source": "cve@gitlab.com", + "tags": [ + "Permissions Required" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-40xx/CVE-2024-4011.json b/CVE-2024/CVE-2024-40xx/CVE-2024-4011.json index d70dfbe889c..b18ed7f16d1 100644 --- a/CVE-2024/CVE-2024-40xx/CVE-2024-4011.json +++ b/CVE-2024/CVE-2024-40xx/CVE-2024-4011.json @@ -2,8 +2,9 @@ "id": "CVE-2024-4011", "sourceIdentifier": "cve@gitlab.com", "published": "2024-06-27T00:15:11.643", - "lastModified": "2024-06-27T12:47:19.847", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-06-28T13:21:27.280", + "vulnStatus": "Analyzed", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -16,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + }, { "source": "cve@gitlab.com", "type": "Secondary", @@ -39,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] + }, { "source": "cve@gitlab.com", "type": "Secondary", @@ -50,14 +81,70 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*", + "versionStartIncluding": "16.1.0", + "versionEndExcluding": "16.11.5", + "matchCriteriaId": "8467259D-8274-43C7-AF90-8036AACC1B0C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*", + "versionStartIncluding": "16.1.0", + "versionEndExcluding": "16.11.5", + "matchCriteriaId": "64A0D7B6-27D3-4E5C-83ED-C72FBB84B5D5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*", + "versionStartIncluding": "17.0.0", + "versionEndExcluding": "17.0.3", + "matchCriteriaId": "541958DE-CB05-43D9-921B-4ADD2E436BF7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*", + "versionStartIncluding": "17.0.0", + "versionEndExcluding": "17.0.3", + "matchCriteriaId": "C987EC42-A56B-462A-A0CE-7417CC0FD414" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gitlab:gitlab:17.1.0:*:*:*:community:*:*:*", + "matchCriteriaId": "D2461A15-EA5F-43D1-B359-0F24713A713B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gitlab:gitlab:17.1.0:*:*:*:enterprise:*:*:*", + "matchCriteriaId": "9AA7835D-35E6-44D6-9194-2AC4C38961CE" + } + ] + } + ] + } + ], "references": [ { "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/457235", - "source": "cve@gitlab.com" + "source": "cve@gitlab.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://hackerone.com/reports/2456186", - "source": "cve@gitlab.com" + "source": "cve@gitlab.com", + "tags": [ + "Permissions Required" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-43xx/CVE-2024-4395.json b/CVE-2024/CVE-2024-43xx/CVE-2024-4395.json index 500a9d873e4..649fc2e0cae 100644 --- a/CVE-2024/CVE-2024-43xx/CVE-2024-4395.json +++ b/CVE-2024/CVE-2024-43xx/CVE-2024-4395.json @@ -2,15 +2,61 @@ "id": "CVE-2024-4395", "sourceIdentifier": "67325c3f-c596-46c5-a235-e1a1e73abe4e", "published": "2024-06-27T22:15:10.653", - "lastModified": "2024-06-27T22:15:10.653", - "vulnStatus": "Received", + "lastModified": "2024-06-28T10:27:00.920", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", "value": "The XPC service within the audit functionality of Jamf Compliance Editor before version 1.3.1 on macOS can lead to local privilege escalation." } ], - "metrics": {}, + "metrics": { + "cvssMetricV40": [ + { + "source": "67325c3f-c596-46c5-a235-e1a1e73abe4e", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:N/AU:N/R:U/V:D/RE:M/U:Green", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "attackRequirements": "PRESENT", + "privilegesRequired": "LOW", + "userInteraction": "ACTIVE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "HIGH", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "HIGH", + "subsequentSystemIntegrity": "HIGH", + "subsequentSystemAvailability": "HIGH", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NEGLIGIBLE", + "automatable": "NO", + "recovery": "USER", + "valueDensity": "DIFFUSE", + "vulnerabilityResponseEffort": "MODERATE", + "providerUrgency": "GREEN", + "baseScore": 7.3, + "baseSeverity": "HIGH" + } + } + ] + }, "references": [ { "url": "https://github.com/Jamf-Concepts/jamf-compliance-editor/raw/v1.3.1/Jamf%20Compliance%20Editor%20-%20User%20Guide.pdf", diff --git a/CVE-2024/CVE-2024-45xx/CVE-2024-4557.json b/CVE-2024/CVE-2024-45xx/CVE-2024-4557.json index 5f08c4367c6..2dbaf903331 100644 --- a/CVE-2024/CVE-2024-45xx/CVE-2024-4557.json +++ b/CVE-2024/CVE-2024-45xx/CVE-2024-4557.json @@ -2,8 +2,9 @@ "id": "CVE-2024-4557", "sourceIdentifier": "cve@gitlab.com", "published": "2024-06-27T00:15:11.863", - "lastModified": "2024-06-27T12:47:19.847", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-06-28T13:19:24.767", + "vulnStatus": "Analyzed", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -16,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + }, { "source": "cve@gitlab.com", "type": "Secondary", @@ -39,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] + }, { "source": "cve@gitlab.com", "type": "Secondary", @@ -50,14 +81,70 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*", + "versionStartIncluding": "1.0.0", + "versionEndExcluding": "16.11.5", + "matchCriteriaId": "D8A9AB42-01E3-403F-B25B-94B5F80FAD33" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*", + "versionStartIncluding": "1.0.0", + "versionEndExcluding": "16.11.5", + "matchCriteriaId": "643E8F12-B786-40F5-B089-0823AD57CC29" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*", + "versionStartIncluding": "17.0.0", + "versionEndExcluding": "17.0.3", + "matchCriteriaId": "541958DE-CB05-43D9-921B-4ADD2E436BF7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*", + "versionStartIncluding": "17.0.0", + "versionEndExcluding": "17.0.3", + "matchCriteriaId": "C987EC42-A56B-462A-A0CE-7417CC0FD414" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gitlab:gitlab:17.1.0:*:*:*:community:*:*:*", + "matchCriteriaId": "D2461A15-EA5F-43D1-B359-0F24713A713B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gitlab:gitlab:17.1.0:*:*:*:enterprise:*:*:*", + "matchCriteriaId": "9AA7835D-35E6-44D6-9194-2AC4C38961CE" + } + ] + } + ] + } + ], "references": [ { "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/460517", - "source": "cve@gitlab.com" + "source": "cve@gitlab.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://hackerone.com/reports/2485172", - "source": "cve@gitlab.com" + "source": "cve@gitlab.com", + "tags": [ + "Permissions Required" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-45xx/CVE-2024-4569.json b/CVE-2024/CVE-2024-45xx/CVE-2024-4569.json index 330aeda0ae2..072fb3df8fb 100644 --- a/CVE-2024/CVE-2024-45xx/CVE-2024-4569.json +++ b/CVE-2024/CVE-2024-45xx/CVE-2024-4569.json @@ -2,8 +2,9 @@ "id": "CVE-2024-4569", "sourceIdentifier": "security@wordfence.com", "published": "2024-06-27T04:15:11.537", - "lastModified": "2024-06-27T12:47:19.847", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-06-28T13:10:05.153", + "vulnStatus": "Analyzed", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -17,8 +18,28 @@ "metrics": { "cvssMetricV31": [ { - "source": "security@wordfence.com", + "source": "nvd@nist.gov", "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, + { + "source": "security@wordfence.com", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", @@ -38,18 +59,57 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:webtechstreet:elementor_addon_elements:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.13.6", + "matchCriteriaId": "784DF2A8-ED5C-43B8-9328-CE235EE08160" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/addon-elements-for-elementor-page-builder/trunk/modules/modal-popup/widgets/modal-popup.php#L1060", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3107074/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/63ef7383-d684-473b-aa0f-45027ef245f6?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-45xx/CVE-2024-4570.json b/CVE-2024/CVE-2024-45xx/CVE-2024-4570.json index 2c4f39cbd53..3af7164e32a 100644 --- a/CVE-2024/CVE-2024-45xx/CVE-2024-4570.json +++ b/CVE-2024/CVE-2024-45xx/CVE-2024-4570.json @@ -2,8 +2,9 @@ "id": "CVE-2024-4570", "sourceIdentifier": "security@wordfence.com", "published": "2024-06-27T04:15:12.553", - "lastModified": "2024-06-27T12:47:19.847", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-06-28T13:38:13.630", + "vulnStatus": "Analyzed", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -17,8 +18,28 @@ "metrics": { "cvssMetricV31": [ { - "source": "security@wordfence.com", + "source": "nvd@nist.gov", "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, + { + "source": "security@wordfence.com", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", @@ -38,18 +59,57 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:webtechstreet:elementor_addon_elements:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.13.6", + "matchCriteriaId": "784DF2A8-ED5C-43B8-9328-CE235EE08160" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/addon-elements-for-elementor-page-builder/tags/1.13.4/classes/helper.php#L232", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3107074/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/ab5f43c0-83d3-4d09-becd-a3552bebd609?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-46xx/CVE-2024-4664.json b/CVE-2024/CVE-2024-46xx/CVE-2024-4664.json index 0f119fc418e..fc361c85f80 100644 --- a/CVE-2024/CVE-2024-46xx/CVE-2024-4664.json +++ b/CVE-2024/CVE-2024-46xx/CVE-2024-4664.json @@ -2,8 +2,9 @@ "id": "CVE-2024-4664", "sourceIdentifier": "contact@wpscan.com", "published": "2024-06-27T06:15:13.627", - "lastModified": "2024-06-27T12:47:19.847", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-06-28T13:28:06.347", + "vulnStatus": "Analyzed", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,11 +15,68 @@ "value": " El complemento de WordPress de WP Chat App anterior a 3.6.5 no sanitiza ni escapa a algunas de sus configuraciones, lo que podr\u00eda permitir a usuarios con altos privilegios, como administradores, realizar ataques de Cross Site Scripting incluso cuando unfiltered_html no est\u00e1 permitido." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ninjateam:wp_chat_app:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "3.6.5", + "matchCriteriaId": "3EBE6B25-ED36-4577-B363-CE14B0F16066" + } + ] + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/46ada0b4-f3cd-44fb-a568-3345e639bdb6/", - "source": "contact@wpscan.com" + "source": "contact@wpscan.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-47xx/CVE-2024-4704.json b/CVE-2024/CVE-2024-47xx/CVE-2024-4704.json index ba374c872e2..359f0898417 100644 --- a/CVE-2024/CVE-2024-47xx/CVE-2024-4704.json +++ b/CVE-2024/CVE-2024-47xx/CVE-2024-4704.json @@ -2,8 +2,9 @@ "id": "CVE-2024-4704", "sourceIdentifier": "contact@wpscan.com", "published": "2024-06-27T06:15:14.697", - "lastModified": "2024-06-27T12:47:19.847", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-06-28T13:27:26.267", + "vulnStatus": "Analyzed", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,11 +15,68 @@ "value": " El complemento de WordPress Contact Form 7 anterior a 5.9.5 tiene una redirecci\u00f3n abierta que permite a un atacante utilizar una URL falsa y redirigir a la URL de su elecci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-601" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:rocklobster:contact_form_7:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "5.9.5", + "matchCriteriaId": "2683E717-A67C-4BF2-934F-8141F092D151" + } + ] + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/8bdcdb5a-9026-4157-8592-345df8fb1a17/", - "source": "contact@wpscan.com" + "source": "contact@wpscan.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-49xx/CVE-2024-4901.json b/CVE-2024/CVE-2024-49xx/CVE-2024-4901.json index dfa80c19d39..dd0dbccab3e 100644 --- a/CVE-2024/CVE-2024-49xx/CVE-2024-4901.json +++ b/CVE-2024/CVE-2024-49xx/CVE-2024-4901.json @@ -2,8 +2,9 @@ "id": "CVE-2024-4901", "sourceIdentifier": "cve@gitlab.com", "published": "2024-06-27T00:15:12.263", - "lastModified": "2024-06-27T12:47:19.847", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-06-28T13:18:19.407", + "vulnStatus": "Analyzed", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -16,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, { "source": "cve@gitlab.com", "type": "Secondary", @@ -39,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + }, { "source": "cve@gitlab.com", "type": "Secondary", @@ -50,14 +81,70 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*", + "versionStartIncluding": "16.9.0", + "versionEndExcluding": "16.11.5", + "matchCriteriaId": "1061CF50-3E72-4FEF-BCD4-9683B5AC2893" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*", + "versionStartIncluding": "16.9.0", + "versionEndExcluding": "16.11.5", + "matchCriteriaId": "A7C994DA-6CAF-4013-8FE6-C2FDD80071ED" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*", + "versionStartIncluding": "17.0.0", + "versionEndExcluding": "17.0.3", + "matchCriteriaId": "541958DE-CB05-43D9-921B-4ADD2E436BF7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*", + "versionStartIncluding": "17.0.0", + "versionEndExcluding": "17.0.3", + "matchCriteriaId": "C987EC42-A56B-462A-A0CE-7417CC0FD414" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gitlab:gitlab:17.1.0:*:*:*:community:*:*:*", + "matchCriteriaId": "D2461A15-EA5F-43D1-B359-0F24713A713B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gitlab:gitlab:17.1.0:*:*:*:enterprise:*:*:*", + "matchCriteriaId": "9AA7835D-35E6-44D6-9194-2AC4C38961CE" + } + ] + } + ] + } + ], "references": [ { "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/461773", - "source": "cve@gitlab.com" + "source": "cve@gitlab.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://hackerone.com/reports/2500163", - "source": "cve@gitlab.com" + "source": "cve@gitlab.com", + "tags": [ + "Permissions Required" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-52xx/CVE-2024-5289.json b/CVE-2024/CVE-2024-52xx/CVE-2024-5289.json index aeedd10816d..4d4b8a6f7ae 100644 --- a/CVE-2024/CVE-2024-52xx/CVE-2024-5289.json +++ b/CVE-2024/CVE-2024-52xx/CVE-2024-5289.json @@ -2,8 +2,9 @@ "id": "CVE-2024-5289", "sourceIdentifier": "security@wordfence.com", "published": "2024-06-27T03:15:50.593", - "lastModified": "2024-06-27T12:47:19.847", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-06-28T13:13:36.980", + "vulnStatus": "Analyzed", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -17,8 +18,28 @@ "metrics": { "cvssMetricV31": [ { - "source": "security@wordfence.com", + "source": "nvd@nist.gov", "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, + { + "source": "security@wordfence.com", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", @@ -38,18 +59,57 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:kadencewp:gutenberg_blocks_with_ai:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "3.2.43", + "matchCriteriaId": "55A66068-22C4-45A8-A182-5C02B4AE5CA6" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/kadence-blocks/tags/3.2.38/includes/blocks/class-kadence-blocks-googlemaps-block.php#L226", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/kadence-blocks/tags/3.2.42/includes/blocks/class-kadence-blocks-googlemaps-block.php#L237", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/f9c0ad1e-380e-4b67-b07e-70bf44e4e614?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-54xx/CVE-2024-5424.json b/CVE-2024/CVE-2024-54xx/CVE-2024-5424.json new file mode 100644 index 00000000000..849bb5d7826 --- /dev/null +++ b/CVE-2024/CVE-2024-54xx/CVE-2024-5424.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2024-5424", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-06-28T09:15:02.420", + "lastModified": "2024-06-28T10:27:00.920", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Gallery Blocks with Lightbox. Image Gallery, (HTML5 video , YouTube, Vimeo) Video Gallery and Lightbox for native gallery plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the \u2018galleryID\u2019 and 'className' parameters in all versions up to, and including, 3.2.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.1, + "impactScore": 2.7 + } + ] + }, + "references": [ + { + "url": "https://plugins.trac.wordpress.org/browser/simply-gallery-block/trunk/blocks/init.php#L127", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/browser/simply-gallery-block/trunk/blocks/init.php#L132", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/browser/simply-gallery-block/trunk/blocks/init.php#L70", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/changeset/3107152/simply-gallery-block/trunk/blocks/init.php", + "source": "security@wordfence.com" + }, + { + "url": "https://wordpress.org/plugins/simply-gallery-block/#developers", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/3e7bd708-2e82-4fef-85f2-bf4f56f66bc4?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-54xx/CVE-2024-5430.json b/CVE-2024/CVE-2024-54xx/CVE-2024-5430.json index eb00f7a031e..fbf1a823ecb 100644 --- a/CVE-2024/CVE-2024-54xx/CVE-2024-5430.json +++ b/CVE-2024/CVE-2024-54xx/CVE-2024-5430.json @@ -2,8 +2,9 @@ "id": "CVE-2024-5430", "sourceIdentifier": "cve@gitlab.com", "published": "2024-06-27T00:15:12.650", - "lastModified": "2024-06-27T12:47:19.847", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-06-28T13:17:34.380", + "vulnStatus": "Analyzed", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -16,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 4.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.6 + }, { "source": "cve@gitlab.com", "type": "Secondary", @@ -39,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "cve@gitlab.com", "type": "Secondary", @@ -50,14 +81,70 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*", + "versionStartIncluding": "16.10.0", + "versionEndExcluding": "16.11.5", + "matchCriteriaId": "E23493BC-7E07-4790-B52E-CA71B7A6467A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*", + "versionStartIncluding": "16.10.0", + "versionEndExcluding": "16.11.5", + "matchCriteriaId": "85300561-C131-4906-8FCA-001B1B3C5A4C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*", + "versionStartIncluding": "17.0.0", + "versionEndExcluding": "17.0.3", + "matchCriteriaId": "541958DE-CB05-43D9-921B-4ADD2E436BF7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*", + "versionStartIncluding": "17.0.0", + "versionEndExcluding": "17.0.3", + "matchCriteriaId": "C987EC42-A56B-462A-A0CE-7417CC0FD414" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gitlab:gitlab:17.1.0:*:*:*:community:*:*:*", + "matchCriteriaId": "D2461A15-EA5F-43D1-B359-0F24713A713B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gitlab:gitlab:17.1.0:*:*:*:enterprise:*:*:*", + "matchCriteriaId": "9AA7835D-35E6-44D6-9194-2AC4C38961CE" + } + ] + } + ] + } + ], "references": [ { "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/464017", - "source": "cve@gitlab.com" + "source": "cve@gitlab.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://hackerone.com/reports/2520947", - "source": "cve@gitlab.com" + "source": "cve@gitlab.com", + "tags": [ + "Permissions Required" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-55xx/CVE-2024-5570.json b/CVE-2024/CVE-2024-55xx/CVE-2024-5570.json new file mode 100644 index 00000000000..ce9a5683daa --- /dev/null +++ b/CVE-2024/CVE-2024-55xx/CVE-2024-5570.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-5570", + "sourceIdentifier": "contact@wpscan.com", + "published": "2024-06-28T06:15:06.593", + "lastModified": "2024-06-28T10:27:00.920", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Simple Photoswipe WordPress plugin through 0.1 does not have authorisation check when updating its settings, which could allow any authenticated users, such as subscriber to update them" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://wpscan.com/vulnerability/49b3a8cb-f606-4cf7-80ec-bfdafd74e848/", + "source": "contact@wpscan.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-56xx/CVE-2024-5601.json b/CVE-2024/CVE-2024-56xx/CVE-2024-5601.json index e534dbeb10d..56a0041d460 100644 --- a/CVE-2024/CVE-2024-56xx/CVE-2024-5601.json +++ b/CVE-2024/CVE-2024-56xx/CVE-2024-5601.json @@ -2,8 +2,9 @@ "id": "CVE-2024-5601", "sourceIdentifier": "security@wordfence.com", "published": "2024-06-27T08:15:09.703", - "lastModified": "2024-06-27T12:47:19.847", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-06-28T13:25:40.677", + "vulnStatus": "Analyzed", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -17,8 +18,28 @@ "metrics": { "cvssMetricV31": [ { - "source": "security@wordfence.com", + "source": "nvd@nist.gov", "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, + { + "source": "security@wordfence.com", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", @@ -38,22 +59,64 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mediavine:create:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.9.8", + "matchCriteriaId": "13B65DBB-1553-431D-8C66-4C4DE5EE5732" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/mediavine-create/trunk/class-plugin.php#L575", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3108144/#file794", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://wordpress.org/plugins/mediavine-create/#developers", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/9d04d8c1-75c0-447c-a26a-c2724c0a6618?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-56xx/CVE-2024-5642.json b/CVE-2024/CVE-2024-56xx/CVE-2024-5642.json index cb3cf39efb6..09d5b5a4137 100644 --- a/CVE-2024/CVE-2024-56xx/CVE-2024-5642.json +++ b/CVE-2024/CVE-2024-56xx/CVE-2024-5642.json @@ -2,8 +2,9 @@ "id": "CVE-2024-5642", "sourceIdentifier": "cna@python.org", "published": "2024-06-27T21:15:16.070", - "lastModified": "2024-06-27T22:15:10.757", - "vulnStatus": "Received", + "lastModified": "2024-06-28T10:27:00.920", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-56xx/CVE-2024-5655.json b/CVE-2024/CVE-2024-56xx/CVE-2024-5655.json index 9ab3dce53cf..a575a839120 100644 --- a/CVE-2024/CVE-2024-56xx/CVE-2024-5655.json +++ b/CVE-2024/CVE-2024-56xx/CVE-2024-5655.json @@ -2,8 +2,9 @@ "id": "CVE-2024-5655", "sourceIdentifier": "cve@gitlab.com", "published": "2024-06-27T00:15:12.887", - "lastModified": "2024-06-27T12:47:19.847", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-06-28T13:16:40.613", + "vulnStatus": "Analyzed", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -16,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "cve@gitlab.com", "type": "Secondary", @@ -39,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "cve@gitlab.com", "type": "Secondary", @@ -50,14 +81,70 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*", + "versionStartIncluding": "15.8.0", + "versionEndExcluding": "16.11.5", + "matchCriteriaId": "553F7F98-3958-4433-A8A7-C15DECDCFCE6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*", + "versionStartIncluding": "15.8.0", + "versionEndExcluding": "16.11.5", + "matchCriteriaId": "40968EC9-BB19-4A6F-8D6D-A4847FEF6167" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*", + "versionStartIncluding": "17.0.0", + "versionEndExcluding": "17.0.3", + "matchCriteriaId": "541958DE-CB05-43D9-921B-4ADD2E436BF7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*", + "versionStartIncluding": "17.0.0", + "versionEndExcluding": "17.0.3", + "matchCriteriaId": "C987EC42-A56B-462A-A0CE-7417CC0FD414" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gitlab:gitlab:17.1.0:*:*:*:community:*:*:*", + "matchCriteriaId": "D2461A15-EA5F-43D1-B359-0F24713A713B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gitlab:gitlab:17.1.0:*:*:*:enterprise:*:*:*", + "matchCriteriaId": "9AA7835D-35E6-44D6-9194-2AC4C38961CE" + } + ] + } + ] + } + ], "references": [ { "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/465862", - "source": "cve@gitlab.com" + "source": "cve@gitlab.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://hackerone.com/reports/2536320", - "source": "cve@gitlab.com" + "source": "cve@gitlab.com", + "tags": [ + "Permissions Required" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-56xx/CVE-2024-5662.json b/CVE-2024/CVE-2024-56xx/CVE-2024-5662.json new file mode 100644 index 00000000000..7603173a66a --- /dev/null +++ b/CVE-2024/CVE-2024-56xx/CVE-2024-5662.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-5662", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-06-28T09:15:02.710", + "lastModified": "2024-06-28T10:27:00.920", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Ultimate Post Kit Addons For Elementor \u2013 (Post Grid, Post Carousel, Post Slider, Category List, Post Tabs, Timeline, Post Ticker, Tag Cloud) plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the \u2018url\u2019 parameter within the Social Count (Static) widget in all versions up to, and including, 3.11.7 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.1, + "impactScore": 2.7 + } + ] + }, + "references": [ + { + "url": "https://plugins.trac.wordpress.org/browser/ultimate-post-kit/tags/3.11.5/modules/static-social-count/widgets/static-social-count.php#L800", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/changeset/3106395/#file526", + "source": "security@wordfence.com" + }, + { + "url": "https://wordpress.org/plugins/ultimate-post-kit/#developers", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/be9d977d-d7b2-4946-b107-35df176fbdf3?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-57xx/CVE-2024-5727.json b/CVE-2024/CVE-2024-57xx/CVE-2024-5727.json new file mode 100644 index 00000000000..a8339a2ca37 --- /dev/null +++ b/CVE-2024/CVE-2024-57xx/CVE-2024-5727.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-5727", + "sourceIdentifier": "contact@wpscan.com", + "published": "2024-06-28T06:15:06.673", + "lastModified": "2024-06-28T10:27:00.920", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Widget4Call WordPress plugin through 1.0.7 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://wpscan.com/vulnerability/5f677863-2f4f-474f-ba48-f490f9d6e71c/", + "source": "contact@wpscan.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-57xx/CVE-2024-5728.json b/CVE-2024/CVE-2024-57xx/CVE-2024-5728.json new file mode 100644 index 00000000000..375921f0f2c --- /dev/null +++ b/CVE-2024/CVE-2024-57xx/CVE-2024-5728.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-5728", + "sourceIdentifier": "contact@wpscan.com", + "published": "2024-06-28T06:15:06.737", + "lastModified": "2024-06-28T10:27:00.920", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Animated AL List WordPress plugin through 1.0.6 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://wpscan.com/vulnerability/287c4e8c-9092-4cb9-9642-e4f3d10f46fa/", + "source": "contact@wpscan.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-57xx/CVE-2024-5729.json b/CVE-2024/CVE-2024-57xx/CVE-2024-5729.json new file mode 100644 index 00000000000..b60d9092d0f --- /dev/null +++ b/CVE-2024/CVE-2024-57xx/CVE-2024-5729.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-5729", + "sourceIdentifier": "contact@wpscan.com", + "published": "2024-06-28T06:15:06.803", + "lastModified": "2024-06-28T10:27:00.920", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Simple AL Slider WordPress plugin through 1.2.10 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://wpscan.com/vulnerability/0352f6f5-cdfd-4cef-9ed5-fdc1cbcb368a/", + "source": "contact@wpscan.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-57xx/CVE-2024-5730.json b/CVE-2024/CVE-2024-57xx/CVE-2024-5730.json new file mode 100644 index 00000000000..03c5bd9d18d --- /dev/null +++ b/CVE-2024/CVE-2024-57xx/CVE-2024-5730.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-5730", + "sourceIdentifier": "contact@wpscan.com", + "published": "2024-06-28T06:15:06.867", + "lastModified": "2024-06-28T10:27:00.920", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Pagerank tools WordPress plugin through 1.1.5 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://wpscan.com/vulnerability/17482b2c-c9ba-480a-8000-879baf835af7/", + "source": "contact@wpscan.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-57xx/CVE-2024-5735.json b/CVE-2024/CVE-2024-57xx/CVE-2024-5735.json new file mode 100644 index 00000000000..6f90e9ae181 --- /dev/null +++ b/CVE-2024/CVE-2024-57xx/CVE-2024-5735.json @@ -0,0 +1,94 @@ +{ + "id": "CVE-2024-5735", + "sourceIdentifier": "cvd@cert.pl", + "published": "2024-06-28T12:15:10.117", + "lastModified": "2024-06-28T13:38:47.077", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Full Path Disclosure vulnerability in AdmirorFrames Joomla! extension in afHelper.php script allows an unauthorised attacker to retrieve location of web root folder.\u00a0This issue affects AdmirorFrames: before 5.0." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cvd@cert.pl", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:Y/R:U/V:D/RE:L/U:Green", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "YES", + "recovery": "USER", + "valueDensity": "DIFFUSE", + "vulnerabilityResponseEffort": "LOW", + "providerUrgency": "GREEN", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + } + } + ] + }, + "weaknesses": [ + { + "source": "cvd@cert.pl", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-497" + } + ] + } + ], + "references": [ + { + "url": "https://cert.pl/en/posts/2024/06/CVE-2024-5735/", + "source": "cvd@cert.pl" + }, + { + "url": "https://cert.pl/posts/2024/06/CVE-2024-5735/", + "source": "cvd@cert.pl" + }, + { + "url": "https://github.com/afine-com/CVE-2024-5735", + "source": "cvd@cert.pl" + }, + { + "url": "https://github.com/sectroyer/CVEs/tree/main/CVE-2024-5735", + "source": "cvd@cert.pl" + }, + { + "url": "https://github.com/vasiljevski/admirorframes/issues/3", + "source": "cvd@cert.pl" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-57xx/CVE-2024-5736.json b/CVE-2024/CVE-2024-57xx/CVE-2024-5736.json new file mode 100644 index 00000000000..e793a4a987c --- /dev/null +++ b/CVE-2024/CVE-2024-57xx/CVE-2024-5736.json @@ -0,0 +1,94 @@ +{ + "id": "CVE-2024-5736", + "sourceIdentifier": "cvd@cert.pl", + "published": "2024-06-28T12:15:10.923", + "lastModified": "2024-06-28T13:38:47.077", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Server Side Request Forgery (SSRF) vulnerability in AdmirorFrames Joomla! extension in afGdStream.php script allows to access local files or server pages available only from localhost.\u00a0This issue affects AdmirorFrames: before 5.0." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cvd@cert.pl", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:Y/R:U/V:D/RE:L/U:Green", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "YES", + "recovery": "USER", + "valueDensity": "DIFFUSE", + "vulnerabilityResponseEffort": "LOW", + "providerUrgency": "GREEN", + "baseScore": 8.2, + "baseSeverity": "HIGH" + } + } + ] + }, + "weaknesses": [ + { + "source": "cvd@cert.pl", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-918" + } + ] + } + ], + "references": [ + { + "url": "https://cert.pl/en/posts/2024/06/CVE-2024-5735/", + "source": "cvd@cert.pl" + }, + { + "url": "https://cert.pl/posts/2024/06/CVE-2024-5735/", + "source": "cvd@cert.pl" + }, + { + "url": "https://github.com/afine-com/CVE-2024-5736", + "source": "cvd@cert.pl" + }, + { + "url": "https://github.com/sectroyer/CVEs/tree/main/CVE-2024-5736", + "source": "cvd@cert.pl" + }, + { + "url": "https://github.com/vasiljevski/admirorframes/issues/3", + "source": "cvd@cert.pl" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-57xx/CVE-2024-5737.json b/CVE-2024/CVE-2024-57xx/CVE-2024-5737.json new file mode 100644 index 00000000000..93395220050 --- /dev/null +++ b/CVE-2024/CVE-2024-57xx/CVE-2024-5737.json @@ -0,0 +1,94 @@ +{ + "id": "CVE-2024-5737", + "sourceIdentifier": "cvd@cert.pl", + "published": "2024-06-28T12:15:11.060", + "lastModified": "2024-06-28T13:38:47.077", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Script afGdStream.php in\u00a0AdmirorFrames Joomla! extension doesn\u2019t specify a content type and as a result default (text/html) is used. An attacker may embed HTML tags directly in image data which is rendered by a webpage as HTML.\u00a0This issue affects AdmirorFrames: before 5.0." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cvd@cert.pl", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:Y/R:U/V:D/RE:L/U:Green", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "YES", + "recovery": "USER", + "valueDensity": "DIFFUSE", + "vulnerabilityResponseEffort": "LOW", + "providerUrgency": "GREEN", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + } + } + ] + }, + "weaknesses": [ + { + "source": "cvd@cert.pl", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://cert.pl/en/posts/2024/06/CVE-2024-5735/", + "source": "cvd@cert.pl" + }, + { + "url": "https://cert.pl/posts/2024/06/CVE-2024-5735/", + "source": "cvd@cert.pl" + }, + { + "url": "https://github.com/afine-com/CVE-2024-5737", + "source": "cvd@cert.pl" + }, + { + "url": "https://github.com/sectroyer/CVEs/tree/main/CVE-2024-5737", + "source": "cvd@cert.pl" + }, + { + "url": "https://github.com/vasiljevski/admirorframes/issues/3", + "source": "cvd@cert.pl" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-57xx/CVE-2024-5788.json b/CVE-2024/CVE-2024-57xx/CVE-2024-5788.json new file mode 100644 index 00000000000..e41ae4643b8 --- /dev/null +++ b/CVE-2024/CVE-2024-57xx/CVE-2024-5788.json @@ -0,0 +1,48 @@ +{ + "id": "CVE-2024-5788", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-06-28T07:15:06.603", + "lastModified": "2024-06-28T10:27:00.920", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Silesia theme for WordPress is vulnerable to Stored Cross-Site Scripting via the \u2018link\u2019 attribute within the theme's Button shortcode in all versions up to, and including, 1.0.6 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.1, + "impactScore": 2.7 + } + ] + }, + "references": [ + { + "url": "https://themes.trac.wordpress.org/browser/silesia/1.0.6/functions/shortcodes.php#L128", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/0183625a-611c-4353-9d2a-7a25ae12709a?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-57xx/CVE-2024-5796.json b/CVE-2024/CVE-2024-57xx/CVE-2024-5796.json new file mode 100644 index 00000000000..c2b28cd12da --- /dev/null +++ b/CVE-2024/CVE-2024-57xx/CVE-2024-5796.json @@ -0,0 +1,48 @@ +{ + "id": "CVE-2024-5796", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-06-28T07:15:06.860", + "lastModified": "2024-06-28T10:27:00.920", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Infinite theme for WordPress is vulnerable to Stored Cross-Site Scripting via the \u2018project_url\u2019 parameter in all versions up to, and including, 1.1.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.1, + "impactScore": 2.7 + } + ] + }, + "references": [ + { + "url": "https://themes.trac.wordpress.org/browser/infinite/1.1.2/framework/metaboxes/metaboxes.php#L79", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/673f0910-8121-4344-b756-2ed5418fdc6b?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-58xx/CVE-2024-5863.json b/CVE-2024/CVE-2024-58xx/CVE-2024-5863.json new file mode 100644 index 00000000000..12478c69560 --- /dev/null +++ b/CVE-2024/CVE-2024-58xx/CVE-2024-5863.json @@ -0,0 +1,48 @@ +{ + "id": "CVE-2024-5863", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-06-28T04:15:05.193", + "lastModified": "2024-06-28T10:27:00.920", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Easy Image Collage plugin for WordPress is vulnerable to unauthorized loss of data due to a missing capability check on the ajax_image_collage() function in all versions up to, and including, 1.13.5. This makes it possible for authenticated attackers, with Contributor-level access and above, to erase all of the content in arbitrary posts." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, + "references": [ + { + "url": "https://plugins.trac.wordpress.org/changeset/3106714/easy-image-collage/tags/1.13.6/helpers/ajax.php", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/ceeefc3f-1cb7-48df-9978-258f015d93c7?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-58xx/CVE-2024-5864.json b/CVE-2024/CVE-2024-58xx/CVE-2024-5864.json new file mode 100644 index 00000000000..3bd87ee5faf --- /dev/null +++ b/CVE-2024/CVE-2024-58xx/CVE-2024-5864.json @@ -0,0 +1,48 @@ +{ + "id": "CVE-2024-5864", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-06-28T04:15:05.567", + "lastModified": "2024-06-28T10:27:00.920", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Easy Affiliate Links plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the eafl_reset_settings AJAX action in all versions up to, and including, 3.7.3. This makes it possible for authenticated attackers, with Subscriber-level access and above, to reset the plugin's settings." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "references": [ + { + "url": "https://plugins.trac.wordpress.org/changeset/3106718/easy-affiliate-links/trunk/includes/admin/class-eafl-tools-manager.php", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/e8a4c656-8df8-44ce-884f-dd502d17f594?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-59xx/CVE-2024-5922.json b/CVE-2024/CVE-2024-59xx/CVE-2024-5922.json new file mode 100644 index 00000000000..ae606a98020 --- /dev/null +++ b/CVE-2024/CVE-2024-59xx/CVE-2024-5922.json @@ -0,0 +1,48 @@ +{ + "id": "CVE-2024-5922", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-06-28T09:15:02.920", + "lastModified": "2024-06-28T10:27:00.920", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Scylla lite theme for WordPress is vulnerable to Stored Cross-Site Scripting via the \u2018url\u2019 parameter within the theme's Button shortcode in all versions up to, and including, 1.8.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.1, + "impactScore": 2.7 + } + ] + }, + "references": [ + { + "url": "https://themes.trac.wordpress.org/browser/scylla-lite/1.8.3/lib/includes/shortcodes.php#L139", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/c57bffc8-1ee5-4380-a78f-f4fc8c606861?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-59xx/CVE-2024-5925.json b/CVE-2024/CVE-2024-59xx/CVE-2024-5925.json new file mode 100644 index 00000000000..674a6e3e242 --- /dev/null +++ b/CVE-2024/CVE-2024-59xx/CVE-2024-5925.json @@ -0,0 +1,48 @@ +{ + "id": "CVE-2024-5925", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-06-28T09:15:03.120", + "lastModified": "2024-06-28T10:27:00.920", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Theron Lite theme for WordPress is vulnerable to Stored Cross-Site Scripting via the \u2018url\u2019 parameter within the theme's Button shortcode in all versions up to, and including, 2.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.1, + "impactScore": 2.7 + } + ] + }, + "references": [ + { + "url": "https://themes.trac.wordpress.org/browser/theron-lite/2.0/lib/includes/shortcodes.php#L76", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/b4737bb2-1bb4-4986-9df5-5978fc46f2ec?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-60xx/CVE-2024-6054.json b/CVE-2024/CVE-2024-60xx/CVE-2024-6054.json index f3cbbb55d40..ba6d259651a 100644 --- a/CVE-2024/CVE-2024-60xx/CVE-2024-6054.json +++ b/CVE-2024/CVE-2024-60xx/CVE-2024-6054.json @@ -2,8 +2,9 @@ "id": "CVE-2024-6054", "sourceIdentifier": "security@wordfence.com", "published": "2024-06-27T03:15:50.890", - "lastModified": "2024-06-27T12:47:19.847", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-06-28T13:11:58.810", + "vulnStatus": "Analyzed", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -16,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "security@wordfence.com", "type": "Secondary", @@ -38,14 +59,50 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:auto-featured-image_project:auto-featured-image:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "1.2", + "matchCriteriaId": "4691CF42-EDE1-4FB5-938F-FA0B2B9AA9FE" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/auto-featured-image/tags/1.2/auto-featured-image.php#L167", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/4d1512c2-75c1-405b-8bb4-f42ec69159a7?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-60xx/CVE-2024-6071.json b/CVE-2024/CVE-2024-60xx/CVE-2024-6071.json index 780e745a23e..875b1c3b3e8 100644 --- a/CVE-2024/CVE-2024-60xx/CVE-2024-6071.json +++ b/CVE-2024/CVE-2024-60xx/CVE-2024-6071.json @@ -2,8 +2,9 @@ "id": "CVE-2024-6071", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2024-06-27T23:15:50.470", - "lastModified": "2024-06-27T23:15:50.470", - "vulnStatus": "Received", + "lastModified": "2024-06-28T10:27:00.920", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -11,6 +12,50 @@ } ], "metrics": { + "cvssMetricV40": [ + { + "source": "ics-cert@hq.dhs.gov", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "HIGH", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "HIGH", + "subsequentSystemIntegrity": "HIGH", + "subsequentSystemAvailability": "HIGH", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 10.0, + "baseSeverity": "CRITICAL" + } + } + ], "cvssMetricV31": [ { "source": "ics-cert@hq.dhs.gov", diff --git a/CVE-2024/CVE-2024-61xx/CVE-2024-6127.json b/CVE-2024/CVE-2024-61xx/CVE-2024-6127.json index 79eb2fb365d..c8195f2e40d 100644 --- a/CVE-2024/CVE-2024-61xx/CVE-2024-6127.json +++ b/CVE-2024/CVE-2024-61xx/CVE-2024-6127.json @@ -2,8 +2,9 @@ "id": "CVE-2024-6127", "sourceIdentifier": "disclosure@vulncheck.com", "published": "2024-06-27T20:15:23.093", - "lastModified": "2024-06-27T20:15:23.093", - "vulnStatus": "Received", + "lastModified": "2024-06-28T10:27:00.920", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-62xx/CVE-2024-6283.json b/CVE-2024/CVE-2024-62xx/CVE-2024-6283.json index 7d29483c037..1523cda1965 100644 --- a/CVE-2024/CVE-2024-62xx/CVE-2024-6283.json +++ b/CVE-2024/CVE-2024-62xx/CVE-2024-6283.json @@ -2,8 +2,9 @@ "id": "CVE-2024-6283", "sourceIdentifier": "security@wordfence.com", "published": "2024-06-27T05:15:51.700", - "lastModified": "2024-06-27T12:47:19.847", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-06-28T13:37:44.763", + "vulnStatus": "Analyzed", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -38,18 +39,57 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:detheme:dethemekit_for_elementor:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.1.6", + "matchCriteriaId": "04DBABED-68E9-4159-9826-F51D73B101A8" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/dethemekit-for-elementor/trunk/widgets/dethemekit-grid.php#L2565", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/dethemekit-for-elementor/trunk/widgets/dethemekit-grid.php#L2900", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/9b2083f9-79d0-43f6-b7ae-a5817dc561b0?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-62xx/CVE-2024-6288.json b/CVE-2024/CVE-2024-62xx/CVE-2024-6288.json new file mode 100644 index 00000000000..491d0c4299a --- /dev/null +++ b/CVE-2024/CVE-2024-62xx/CVE-2024-6288.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-6288", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-06-28T07:15:07.137", + "lastModified": "2024-06-28T10:27:00.920", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Conversios \u2013 Google Analytics 4 (GA4), Meta Pixel & more Via Google Tag Manager For WooCommerce plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the \u2018tiktok_user_id\u2019 parameter in all versions up to, and including, 7.0.12 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.6, + "impactScore": 2.7 + } + ] + }, + "references": [ + { + "url": "https://plugins.trac.wordpress.org/browser/enhanced-e-commerce-for-woocommerce-store/tags/7.1.0/admin/partials/wizard-productfeed-even.php?rev=3105213#L371", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/browser/enhanced-e-commerce-for-woocommerce-store/tags/7.1.0/admin/partials/wizard-productfeed-odd.php?rev=3105213#L368", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/changeset/3108037/", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/f668c3cd-bf64-4e95-8d75-70e4f12cabce?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-62xx/CVE-2024-6296.json b/CVE-2024/CVE-2024-62xx/CVE-2024-6296.json new file mode 100644 index 00000000000..48143a5ece5 --- /dev/null +++ b/CVE-2024/CVE-2024-62xx/CVE-2024-6296.json @@ -0,0 +1,52 @@ +{ + "id": "CVE-2024-6296", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-06-28T04:15:05.853", + "lastModified": "2024-06-28T10:27:00.920", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Stackable \u2013 Page Builder Gutenberg Blocks plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the \u2018data-caption\u2019 parameter in all versions up to, and including, 3.13.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.1, + "impactScore": 2.7 + } + ] + }, + "references": [ + { + "url": "https://plugins.trac.wordpress.org/browser/stackable-ultimate-gutenberg-blocks/trunk/dist/frontend_image_lightbox.js", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/changeset/3108514/", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/e55742de-9eaf-48e4-8d5d-ea980dfa17cf?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-63xx/CVE-2024-6307.json b/CVE-2024/CVE-2024-63xx/CVE-2024-6307.json index 7a0532d8f58..653850cd50d 100644 --- a/CVE-2024/CVE-2024-63xx/CVE-2024-6307.json +++ b/CVE-2024/CVE-2024-63xx/CVE-2024-6307.json @@ -2,12 +2,17 @@ "id": "CVE-2024-6307", "sourceIdentifier": "security@wordfence.com", "published": "2024-06-25T11:15:50.820", - "lastModified": "2024-06-25T12:24:17.873", + "lastModified": "2024-06-28T13:15:03.453", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", - "value": "WordPress Core is vulnerable to Stored Cross-Site Scripting via the HTML API in various versions up to 6.5.5 due to insufficient input sanitization and output escaping on URLs. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + "value": "WordPress Core is vulnerable to Stored Cross-Site Scripting via the HTML API in various versions prior to 6.5.5 due to insufficient input sanitization and output escaping on URLs. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "WordPress Core es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s de la API HTML en varias versiones hasta la 6.5.5 debido a una sanitizaci\u00f3n de entrada insuficiente y a un escape de salida en las URL. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-63xx/CVE-2024-6323.json b/CVE-2024/CVE-2024-63xx/CVE-2024-6323.json index 442ccb5430d..da12c9ec479 100644 --- a/CVE-2024/CVE-2024-63xx/CVE-2024-6323.json +++ b/CVE-2024/CVE-2024-63xx/CVE-2024-6323.json @@ -2,8 +2,9 @@ "id": "CVE-2024-6323", "sourceIdentifier": "cve@gitlab.com", "published": "2024-06-27T00:15:13.130", - "lastModified": "2024-06-27T12:47:19.847", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-06-28T13:15:19.317", + "vulnStatus": "Analyzed", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -16,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + }, { "source": "cve@gitlab.com", "type": "Secondary", @@ -39,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] + }, { "source": "cve@gitlab.com", "type": "Secondary", @@ -50,10 +81,44 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*", + "versionStartIncluding": "16.11.0", + "versionEndExcluding": "16.11.5", + "matchCriteriaId": "5396A016-FF8D-4525-A35A-3E9512C73AE6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*", + "versionStartIncluding": "17.0.0", + "versionEndExcluding": "17.0.3", + "matchCriteriaId": "C987EC42-A56B-462A-A0CE-7417CC0FD414" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gitlab:gitlab:17.1.0:*:*:*:enterprise:*:*:*", + "matchCriteriaId": "9AA7835D-35E6-44D6-9194-2AC4C38961CE" + } + ] + } + ] + } + ], "references": [ { "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/457912", - "source": "cve@gitlab.com" + "source": "cve@gitlab.com", + "tags": [ + "Broken Link" + ] } ] } \ No newline at end of file diff --git a/README.md b/README.md index 40d95eec9bb..bd9011cf961 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-06-27T23:55:18.879958+00:00 +2024-06-28T16:01:07.532461+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-06-27T23:15:50.470000+00:00 +2024-06-28T15:15:03.047000+00:00 ``` ### Last Data Feed Release @@ -27,33 +27,75 @@ Repository synchronizes with the NVD every 2 hours. Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest) ```plain -2024-06-27T00:00:08.641951+00:00 +2024-06-28T00:00:08.638131+00:00 ``` ### Total Number of included CVEs ```plain -255400 +255441 ``` ### CVEs added in the last Commit -Recently added CVEs: `6` +Recently added CVEs: `41` -- [CVE-2016-20022](CVE-2016/CVE-2016-200xx/CVE-2016-20022.json) (`2024-06-27T23:15:50.127`) -- [CVE-2023-52892](CVE-2023/CVE-2023-528xx/CVE-2023-52892.json) (`2024-06-27T22:15:10.277`) -- [CVE-2024-36059](CVE-2024/CVE-2024-360xx/CVE-2024-36059.json) (`2024-06-27T22:15:10.437`) -- [CVE-2024-39705](CVE-2024/CVE-2024-397xx/CVE-2024-39705.json) (`2024-06-27T22:15:10.543`) -- [CVE-2024-4395](CVE-2024/CVE-2024-43xx/CVE-2024-4395.json) (`2024-06-27T22:15:10.653`) -- [CVE-2024-6071](CVE-2024/CVE-2024-60xx/CVE-2024-6071.json) (`2024-06-27T23:15:50.470`) +- [CVE-2024-39348](CVE-2024/CVE-2024-393xx/CVE-2024-39348.json) (`2024-06-28T07:15:06.043`) +- [CVE-2024-39349](CVE-2024/CVE-2024-393xx/CVE-2024-39349.json) (`2024-06-28T06:15:05.500`) +- [CVE-2024-39350](CVE-2024/CVE-2024-393xx/CVE-2024-39350.json) (`2024-06-28T07:15:06.330`) +- [CVE-2024-39351](CVE-2024/CVE-2024-393xx/CVE-2024-39351.json) (`2024-06-28T06:15:05.887`) +- [CVE-2024-39352](CVE-2024/CVE-2024-393xx/CVE-2024-39352.json) (`2024-06-28T06:15:06.223`) +- [CVE-2024-39704](CVE-2024/CVE-2024-397xx/CVE-2024-39704.json) (`2024-06-28T13:15:02.927`) +- [CVE-2024-39708](CVE-2024/CVE-2024-397xx/CVE-2024-39708.json) (`2024-06-28T01:15:08.793`) +- [CVE-2024-5424](CVE-2024/CVE-2024-54xx/CVE-2024-5424.json) (`2024-06-28T09:15:02.420`) +- [CVE-2024-5570](CVE-2024/CVE-2024-55xx/CVE-2024-5570.json) (`2024-06-28T06:15:06.593`) +- [CVE-2024-5662](CVE-2024/CVE-2024-56xx/CVE-2024-5662.json) (`2024-06-28T09:15:02.710`) +- [CVE-2024-5727](CVE-2024/CVE-2024-57xx/CVE-2024-5727.json) (`2024-06-28T06:15:06.673`) +- [CVE-2024-5728](CVE-2024/CVE-2024-57xx/CVE-2024-5728.json) (`2024-06-28T06:15:06.737`) +- [CVE-2024-5729](CVE-2024/CVE-2024-57xx/CVE-2024-5729.json) (`2024-06-28T06:15:06.803`) +- [CVE-2024-5730](CVE-2024/CVE-2024-57xx/CVE-2024-5730.json) (`2024-06-28T06:15:06.867`) +- [CVE-2024-5735](CVE-2024/CVE-2024-57xx/CVE-2024-5735.json) (`2024-06-28T12:15:10.117`) +- [CVE-2024-5736](CVE-2024/CVE-2024-57xx/CVE-2024-5736.json) (`2024-06-28T12:15:10.923`) +- [CVE-2024-5737](CVE-2024/CVE-2024-57xx/CVE-2024-5737.json) (`2024-06-28T12:15:11.060`) +- [CVE-2024-5788](CVE-2024/CVE-2024-57xx/CVE-2024-5788.json) (`2024-06-28T07:15:06.603`) +- [CVE-2024-5796](CVE-2024/CVE-2024-57xx/CVE-2024-5796.json) (`2024-06-28T07:15:06.860`) +- [CVE-2024-5863](CVE-2024/CVE-2024-58xx/CVE-2024-5863.json) (`2024-06-28T04:15:05.193`) +- [CVE-2024-5864](CVE-2024/CVE-2024-58xx/CVE-2024-5864.json) (`2024-06-28T04:15:05.567`) +- [CVE-2024-5922](CVE-2024/CVE-2024-59xx/CVE-2024-5922.json) (`2024-06-28T09:15:02.920`) +- [CVE-2024-5925](CVE-2024/CVE-2024-59xx/CVE-2024-5925.json) (`2024-06-28T09:15:03.120`) +- [CVE-2024-6288](CVE-2024/CVE-2024-62xx/CVE-2024-6288.json) (`2024-06-28T07:15:07.137`) +- [CVE-2024-6296](CVE-2024/CVE-2024-62xx/CVE-2024-6296.json) (`2024-06-28T04:15:05.853`) ### CVEs modified in the last Commit -Recently modified CVEs: `2` +Recently modified CVEs: `157` -- [CVE-2022-4968](CVE-2022/CVE-2022-49xx/CVE-2022-4968.json) (`2024-06-27T22:15:10.033`) -- [CVE-2024-5642](CVE-2024/CVE-2024-56xx/CVE-2024-5642.json) (`2024-06-27T22:15:10.757`) +- [CVE-2024-39134](CVE-2024/CVE-2024-391xx/CVE-2024-39134.json) (`2024-06-28T10:27:00.920`) +- [CVE-2024-39207](CVE-2024/CVE-2024-392xx/CVE-2024-39207.json) (`2024-06-28T10:27:00.920`) +- [CVE-2024-39208](CVE-2024/CVE-2024-392xx/CVE-2024-39208.json) (`2024-06-28T10:27:00.920`) +- [CVE-2024-39209](CVE-2024/CVE-2024-392xx/CVE-2024-39209.json) (`2024-06-28T10:27:00.920`) +- [CVE-2024-3959](CVE-2024/CVE-2024-39xx/CVE-2024-3959.json) (`2024-06-28T13:21:52.223`) +- [CVE-2024-39705](CVE-2024/CVE-2024-397xx/CVE-2024-39705.json) (`2024-06-28T10:27:00.920`) +- [CVE-2024-4011](CVE-2024/CVE-2024-40xx/CVE-2024-4011.json) (`2024-06-28T13:21:27.280`) +- [CVE-2024-4395](CVE-2024/CVE-2024-43xx/CVE-2024-4395.json) (`2024-06-28T10:27:00.920`) +- [CVE-2024-4557](CVE-2024/CVE-2024-45xx/CVE-2024-4557.json) (`2024-06-28T13:19:24.767`) +- [CVE-2024-4569](CVE-2024/CVE-2024-45xx/CVE-2024-4569.json) (`2024-06-28T13:10:05.153`) +- [CVE-2024-4570](CVE-2024/CVE-2024-45xx/CVE-2024-4570.json) (`2024-06-28T13:38:13.630`) +- [CVE-2024-4664](CVE-2024/CVE-2024-46xx/CVE-2024-4664.json) (`2024-06-28T13:28:06.347`) +- [CVE-2024-4704](CVE-2024/CVE-2024-47xx/CVE-2024-4704.json) (`2024-06-28T13:27:26.267`) +- [CVE-2024-4901](CVE-2024/CVE-2024-49xx/CVE-2024-4901.json) (`2024-06-28T13:18:19.407`) +- [CVE-2024-5289](CVE-2024/CVE-2024-52xx/CVE-2024-5289.json) (`2024-06-28T13:13:36.980`) +- [CVE-2024-5430](CVE-2024/CVE-2024-54xx/CVE-2024-5430.json) (`2024-06-28T13:17:34.380`) +- [CVE-2024-5601](CVE-2024/CVE-2024-56xx/CVE-2024-5601.json) (`2024-06-28T13:25:40.677`) +- [CVE-2024-5642](CVE-2024/CVE-2024-56xx/CVE-2024-5642.json) (`2024-06-28T10:27:00.920`) +- [CVE-2024-5655](CVE-2024/CVE-2024-56xx/CVE-2024-5655.json) (`2024-06-28T13:16:40.613`) +- [CVE-2024-6054](CVE-2024/CVE-2024-60xx/CVE-2024-6054.json) (`2024-06-28T13:11:58.810`) +- [CVE-2024-6071](CVE-2024/CVE-2024-60xx/CVE-2024-6071.json) (`2024-06-28T10:27:00.920`) +- [CVE-2024-6127](CVE-2024/CVE-2024-61xx/CVE-2024-6127.json) (`2024-06-28T10:27:00.920`) +- [CVE-2024-6283](CVE-2024/CVE-2024-62xx/CVE-2024-6283.json) (`2024-06-28T13:37:44.763`) +- [CVE-2024-6307](CVE-2024/CVE-2024-63xx/CVE-2024-6307.json) (`2024-06-28T13:15:03.453`) +- [CVE-2024-6323](CVE-2024/CVE-2024-63xx/CVE-2024-6323.json) (`2024-06-28T13:15:19.317`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 54fd479a37b..01d40fa06c6 100644 --- a/_state.csv +++ b/_state.csv @@ -18260,7 +18260,7 @@ CVE-2006-2488,0,0,a66e0f14fd2024ccd68caae5ff1fa2f46c374c6ba923e8ba862a22190139ee CVE-2006-2489,0,0,cc96a77a1f9d6f736dc458cb83ab266ca3e22356934b8941aac4d6e6fd326086,2018-10-03T21:41:02.777000 CVE-2006-2490,0,0,d2301f5e2c8f6488f14c502f6c5229018a690a5cfebc9af017e6c96531398491,2018-10-18T16:40:22.820000 CVE-2006-2491,0,0,f3f44cab2f81a6b75693fd8278f76b69a83b9d929739df2926d336cc67303c77,2018-10-18T16:40:23.757000 -CVE-2006-2492,0,0,8eb95f2f968156768e49643569ebe5530927aaa38060d6fc8f40b1e09ec56b44,2018-10-12T21:40:15.057000 +CVE-2006-2492,0,1,1abd6ae95916d54eefc6704604cd9ccc1808328e3add03fccf718dcb499fd9d8,2024-06-28T14:15:04.557000 CVE-2006-2493,0,0,89883efef0bbc2e4c1d5a25d6995ecb6fe98284d5a7c42328b9cbdbe653f88bc,2023-11-07T01:58:50.130000 CVE-2006-2494,0,0,53017f9592dc1180f9ad562dead75b26cfadfc7ef1a9cafb11b5c506db65f267,2017-10-19T01:29:08.173000 CVE-2006-2495,0,0,14bd86becc35f2cc5cb0ccd656a0168faadbc6a835444e799e40dc2b83407642,2011-03-08T02:36:18.720000 @@ -28475,7 +28475,7 @@ CVE-2007-5655,0,0,00191ef1fd43a38e3639cf4316d7e5867257b3c4d5ba8c4c6e1a0a6c13f6e5 CVE-2007-5656,0,0,1aa49bdb03ccb02848db9bb4a0da06dddda736dd6f7e87929ef8591b39fe6f08,2017-07-29T01:33:47.693000 CVE-2007-5657,0,0,9895bea98426428ae601493eacf129dba9b6c925bc03a639dacb3b3f6e163abe,2017-07-29T01:33:47.757000 CVE-2007-5658,0,0,604e156e8fe0c2744192e8f3da5b3fef43ead081591a630776bf3a92fd10ba93,2017-07-29T01:33:47.803000 -CVE-2007-5659,0,0,d4d24e2202f9d7361aa0f53671ab40fbfc0de6a7901e8f8b0ba5bdca72f7b9dc,2017-09-29T01:29:40.190000 +CVE-2007-5659,0,1,8d962472152c529b645f9fa1f1698929b43792bc3dc15c820892c243c85f7050,2024-06-28T14:15:25.450000 CVE-2007-5660,0,0,13f290cf18d4a54090d024eb9a4447b23e4ebe8f802bd9c5257bbc86ad314673,2017-07-29T01:33:47.867000 CVE-2007-5661,0,0,ccfb7c388531b35429bbcaaabe0c900b8456fb432471523a4314e1f243662326,2017-07-29T01:33:47.927000 CVE-2007-5663,0,0,d1bf70def099dd5af1f6f805a41e01ef54910ca6948f78e1418f02091f688208,2017-09-29T01:29:40.253000 @@ -30145,7 +30145,7 @@ CVE-2008-0651,0,0,7fb789344a700d767989ac7d0fce053fba3e8b3a8b84ec9152e2628af29e81 CVE-2008-0652,0,0,405c5d2fd4089416ea13c6f45ab59bbf76147ed471e9a19068449e754a2cd6c6,2017-09-29T01:30:23.787000 CVE-2008-0653,0,0,e50dc38bacacaea5f35bace767305ce1b3527fa7fc842f275b69b7f51c3ee627,2017-09-29T01:30:23.847000 CVE-2008-0654,0,0,e8dc1de16f1b8bb2dfe1ebcd8269ba36443c4ce8d296c7a58d23f87bde7579c3,2018-10-15T22:02:20.900000 -CVE-2008-0655,0,0,fe4b603c083d3f4ec4514c1e1b3df2394cc6cd00fab889f403e9f1eb8a694ca7,2018-10-30T16:25:16.967000 +CVE-2008-0655,0,1,04941de9149cdce7dc6f1199fd44d21b3988e01fd16b6fd01e0c3048a94db220,2024-06-28T14:15:34.880000 CVE-2008-0656,0,0,d0dc832114ff7aa633148d5c5337a59608df5daedb9d03063302068ab41e49c9,2018-10-15T22:02:21.103000 CVE-2008-0657,0,0,f11c78513190a0d8c3b19a89ac00dbc9f3e82a15093554c1c8e37cf1c62269a2,2017-09-29T01:30:24.020000 CVE-2008-0658,0,0,268aaad34007ab82d46002886606aea640477084d2d60b76fa8f1489824eeb09,2018-10-15T22:02:21.667000 @@ -37236,13 +37236,13 @@ CVE-2009-0553,0,0,41fe7b70c092a09fa464bb095f74f79a86671583870c05a19aa6da631682c5 CVE-2009-0554,0,0,9c4057e24454d779bda7c89738a9c534d115662cb56bbe00b2e9d0765ed87fef,2023-12-07T18:38:56.693000 CVE-2009-0555,0,0,0b9b2ee17347dda6d463fe84428dfdfa294914454d506054e73795f766aef918,2019-02-28T01:20:18.863000 CVE-2009-0556,0,0,753c76284b47419e2f0296ffdbd2766c8ee264581c95312381ce4c3a18a5ee99,2018-10-12T21:50:34.863000 -CVE-2009-0557,0,0,556c2779eb870dd97ccc0e7292073e96d3fb1b803d0b758e3dbd0fe140b9af70,2018-10-12T21:50:37.457000 +CVE-2009-0557,0,1,86e13ed99971a4e9b7579524803d658e3ff832b4c4d59118e0d8a52714915004,2024-06-28T14:15:47.220000 CVE-2009-0558,0,0,1ce5ca37157b1c2f6aa54cf1cab2fa6ab7fb22cf350b82f05ca2d2138f25780e,2018-10-12T21:50:38.397000 CVE-2009-0559,0,0,7a3d567dea5b634171fb841903198da8a4ce943389820c4c364b96ee5ac6099c,2018-10-12T21:50:39.740000 CVE-2009-0560,0,0,a5c9a49f3f43bbc485262cc7f991f4a190ca059deb0b16197c7e654dfdb9013c,2018-10-12T21:50:40.410000 CVE-2009-0561,0,0,fffe3979966167a14839aebb79a41334162e6f77885467cde056d0f576e4207a,2018-10-12T21:50:41.367000 CVE-2009-0562,0,0,6e5138dd200476ed5a02f1f54841986d81176ecb36257de34788e5601f0f106c,2018-10-12T21:50:42.663000 -CVE-2009-0563,0,0,25aa60cbe603a923dac282a35e7ea96fe6e94cab00ee78efea67d8982a374252,2018-10-12T21:50:43.147000 +CVE-2009-0563,0,1,1032a95f292d672b6606454c4ff95939a59e7d52456133bcd264ee7aacf4e262,2024-06-28T14:15:58.267000 CVE-2009-0565,0,0,b312fd2106fd5c1a06101764add2e62b7e15e176136cf22b06651236f0b11307,2018-10-12T21:50:44.350000 CVE-2009-0566,0,0,a6a8cf0eec6fc545554277b445934a6465c39b7da6cdce91c1ac89d64fac6a25,2018-10-12T21:50:45.380000 CVE-2009-0567,0,0,e3b09300cc65051df8b23765059232ae1592215beae8e3bc21f16f7d61c780fb,2023-11-07T02:03:40.077000 @@ -38495,7 +38495,7 @@ CVE-2009-1858,0,0,4f47f6fd529b8ba05ef78634dc7323510a467a64319fd67b63b9c8fe6385c5 CVE-2009-1859,0,0,496965481f92c4e97690d65fe37415b3ea656e95184c5a8aff5be446f4f0d482,2010-05-04T05:43:23.077000 CVE-2009-1860,0,0,08f55a857233d335ac3322f1779868fa5286dfd4e36b55b61c62402d373cbd8c,2009-07-02T03:31:29.157000 CVE-2009-1861,0,0,c4ab3858ce34aaeeb5f29fcf6a4ae73bee1539c5dadbab836fd1709ad24a6ee8,2010-05-04T05:43:23.297000 -CVE-2009-1862,0,0,44566a341a4caf2ff800428d65d0198ce9d57fd3e9792fa2c1b946e9cbe7b5a6,2009-09-16T05:31:35.203000 +CVE-2009-1862,0,1,f8b90b06e7479937d181c26569cc259a0501fe02e7ab0560d8c37601aa2f2ee6,2024-06-28T14:20:12.417000 CVE-2009-1863,0,0,6fa1c44b6f3be2fd355741dc5294cd83b6d99bbb1d790908cde6031a6e1297dc,2017-09-29T01:34:37.217000 CVE-2009-1864,0,0,c3978dd57d918c1c1d77b2c5813dd48fecb28d3b5dba119f08fc2c44b2362a73,2017-09-29T01:34:37.297000 CVE-2009-1865,0,0,eb4b837983be592dc2d109f60ced9f4de31c2338fb3be33b5bb476c0036c22c5,2017-09-29T01:34:37.390000 @@ -40541,7 +40541,7 @@ CVE-2009-3949,0,0,43a37208b28a3556a9b27c417d256d26f0b91d8983927631b388ad8007513f CVE-2009-3950,0,0,7b31297944503e9d5ce71507a8d378c32eb7089e5bc300bc6668007734f7eb67,2018-10-10T19:47:53.643000 CVE-2009-3951,0,0,022cd0f08d526a59b911ae4d3cf3be9947c7e23a5618f25cb64394eff719f29a,2018-10-30T16:26:24.687000 CVE-2009-3952,0,0,b90e9d4401f99ae455843028a5edd8ee8ffd4b4499a1c274bcd43192bf6a2bd5,2010-01-11T12:25:39.843000 -CVE-2009-3953,0,0,7bb95745eee6eb5cb1d236ad8c0d07b6c47a7f6ad07953412f97fcc5f4dbbd39,2018-10-30T16:25:16.967000 +CVE-2009-3953,0,1,f02b806825da86e0ea91e34484eb1cb50ec33ac260c0ac9a7b7c1c7449baa135,2024-06-28T14:20:25.363000 CVE-2009-3954,0,0,0b36b31f52ced7711f3b33321d44c1d96eb10cb9b87b0a8efd1ade977a41de90,2018-10-30T16:25:16.967000 CVE-2009-3955,0,0,1fcb0c9c5d053f4f6ec290bf367adca276087e8d679941e211676d6a83a66a8c,2018-10-30T16:25:16.967000 CVE-2009-3956,0,0,a4a97a48f3fd6a302e6baa1f31f2b7f9f6693a17b6a13de36c6101f0d40f900d,2018-10-30T16:25:16.967000 @@ -40903,7 +40903,7 @@ CVE-2009-4320,0,0,fdc33476169c51ce3ed7b7eaf0daa3bf8d52d0feeb90da266f10239a18e85f CVE-2009-4321,0,0,80ab35b7737b8d00e93661d8d53736d7ad06b167dfcd3a7a54d76186da336016,2018-10-10T19:49:05.070000 CVE-2009-4322,0,0,cfc4b8faa0d1da8ab26603ce3dec6b666634f3f5e9cf7832571612ffbe7866c0,2018-10-10T19:49:05.760000 CVE-2009-4323,0,0,43568f2d94f8107dd1e091d331c6f3baf97fb945554c055990e313b7aec96dff,2009-12-15T05:00:00 -CVE-2009-4324,0,0,c1580aa54aca59ef62bcedeb31c760525c0e9e6a0fb2c1008cf01713adf799b1,2018-10-30T16:25:16.967000 +CVE-2009-4324,0,1,5fba43087cb8fe32bcab1bbae487e317e496b4e35f6be0c7b20d3993a3c0d3c2,2024-06-28T14:20:36.847000 CVE-2009-4325,0,0,b88e8901540da51a2a15ac46f364cec32d06b115b71292d04a932ca5ffa95dc3,2010-06-29T04:00:00 CVE-2009-4326,0,0,a2656d64b2d52ce94be13124cdac5b67322a7e8c68faa70e34efb8c1a5aa8d24,2010-06-29T04:00:00 CVE-2009-4327,0,0,af020740efa9bc6ddaead43b89f9c74a26192499469df8e5706cf12aa48e3516,2010-06-29T04:00:00 @@ -43011,7 +43011,7 @@ CVE-2010-1293,0,0,3b5f20a5c915b72ed67919c68bb9fb4fdf908710bdbe28556e8e9784e2f597 CVE-2010-1294,0,0,7dbc591fc13e434ec4369965befa563c1ac3e5072337c35227ece6f11065e69f,2010-05-14T04:00:00 CVE-2010-1295,0,0,51e36360f169115210bfefbf76182cfe84b723c17ef6ab6424cf6cfdb9dee263,2018-10-30T16:25:16.967000 CVE-2010-1296,0,0,cd2f28af780185be458df6aa1ac0e98086245ddefe1766ac99ee7232e06b7a84,2017-08-17T01:32:19.197000 -CVE-2010-1297,0,0,220df96546075ab53df53179f9c75fc4bd5159a858fb7682cd3a44671cfc0cd5,2017-09-19T01:30:40.563000 +CVE-2010-1297,0,1,596f58772f0f6774ab96931d194a2832ff47375f0f42336bbfcf1afc81abc591,2024-06-28T14:20:44.153000 CVE-2010-1298,0,0,f153d353087afe7fc9a3e1d20934bb14e20dc64991906df5ac43ed3260ab7320,2010-04-07T04:00:00 CVE-2010-1299,0,0,b4d4e1ac2e23cdda9017287d91509692cfcefd35e1b06a5821a68336d916cbf1,2023-11-07T02:05:18.077000 CVE-2010-1300,0,0,e992c2fcaf330a004da51ced4e40761e57a3e14a0e010787b7eafb0c1cc2678b,2017-08-17T01:32:19.447000 @@ -44260,11 +44260,11 @@ CVE-2010-2564,0,0,386a019e7ff7ccf26385f2394bbbdb95f7920798ff75a995e5190c12c1f3ad CVE-2010-2565,0,0,66ba9844f29a76720944929be417a0b1aad505be19399db7db591eb5a819148d,2023-11-07T02:05:40.273000 CVE-2010-2566,0,0,cbd420e7dc344c5af1d3037e96e501768188aa7c1782bdd16334640e7d5f14bd,2019-02-26T14:04:00.993000 CVE-2010-2567,0,0,0fa8df2197efa40a1f0ec8df8d309efadaea3a59c8c7138a98c91c64a910f6b7,2019-02-26T14:04:00.993000 -CVE-2010-2568,0,0,4693a4f64d27e63f312d25ba8567e44309467321f84cd864762308ae4cbcbf56,2023-12-07T18:38:56.693000 +CVE-2010-2568,0,1,7dcb70665ba989afb99263f0692de8d4e12f22cebacc50ce75b422e1ba503f55,2024-06-28T14:02:11.327000 CVE-2010-2569,0,0,0eac84db88c340e97458f8f74bc92ab829d01b87cdfb065d89e4dc1d59217913,2018-10-12T21:57:59.077000 CVE-2010-2570,0,0,6f6b4b9216f4ffe61c2eb601e7d62d094608719afef6dd767864f45f9204c890,2018-10-12T21:57:59.563000 CVE-2010-2571,0,0,9e3d005e0f745dacb90bcd49649b9e8690daddaf70db496cf56050daeaddd362,2018-10-12T21:58:00.063000 -CVE-2010-2572,0,0,b1dea6599f7e715dd567a5b6f596a0aa68b39bc4b85f8ee4a100fe97e8c21cf7,2018-10-12T21:58:00.563000 +CVE-2010-2572,0,1,a0422a7ff493634771592ecc38e86e7cb2bf25169e293aa84f21d2b68e83e121,2024-06-28T14:16:06.983000 CVE-2010-2573,0,0,18f014d5994aa68385c5b14a4ce9774d2f1bf4fffec433403777179d74f9b6d5,2018-10-12T21:58:00.970000 CVE-2010-2574,0,0,5dfb9a15ee144a2661d042527278aaa12448dbeaad9de7375536e30d56527b48,2018-10-10T19:59:43.807000 CVE-2010-2575,0,0,ec4af62dbb23f16a39d444d918efbf08b0a0166894fdc374e2ca95251319a399,2018-10-10T19:59:44.650000 @@ -44561,7 +44561,7 @@ CVE-2010-2879,0,0,a717be8188779b8fa2b1d19d0770c288b0a7678c97356c82e0548c2c6247f4 CVE-2010-2880,0,0,d8945d56f1004596b1eac814242d9d4a74deb2052a455868d7de6afe2c2a677e,2018-10-10T20:00:15.890000 CVE-2010-2881,0,0,232db8e138ac05b2cc3d763ce063e00439b875c9cb2ea4bdad918f04a443fef7,2018-10-10T20:00:16.450000 CVE-2010-2882,0,0,beb5500d8a9796b07df3288d82990ede154b9eebc5730c7752e6e8bd19590316,2018-10-10T20:00:16.983000 -CVE-2010-2883,0,0,cc4c143f5569ab31a5ca2c4b75b78ba3f8e24b66e95059a3b48bc3f0adcab0c8,2018-10-30T16:25:16.967000 +CVE-2010-2883,0,1,a782191d15b401af7f2b8d5cdcfbc56648ccdcd741fa1bfcbb8dbdbfad6ee898,2024-06-28T14:16:27.380000 CVE-2010-2884,0,0,32f0de7d446605a1befe537a0d777c9062e89a7c31f784d88fa48beb3f402ad3,2018-10-30T16:26:24.687000 CVE-2010-2885,0,0,cd5deea7427103ace3aa44df2d307289158ee2714ae3dc632eb099beac49e2ef,2010-10-28T04:00:00 CVE-2010-2886,0,0,1222faffb8e258dd47ec30eb4a0457e71efd25de1b905ab6d26383cd193bf199,2010-10-28T04:00:00 @@ -47499,7 +47499,7 @@ CVE-2011-0605,0,0,bc99fe2af2fd73076703c0ec0502e0d64fce8f2916e4cb45407b05bc001c19 CVE-2011-0606,0,0,7744b0c2b7e6d20bcc642a4dab031bf5323849b92d3e01a2daed85dbe6b3bbc2,2018-10-30T16:25:16.967000 CVE-2011-0607,0,0,34dae17e937ee80370facfa36e3fd70c92a5a0fee51b087a28002da2992a5a26,2018-10-30T16:26:24.687000 CVE-2011-0608,0,0,8934fb8e569fb4c1f54cc32e56890b5cf9ed6d756fa77ded0f58527d19aff8ee,2018-10-30T16:26:24.687000 -CVE-2011-0609,0,0,46d3e3a5ab31dc3ca61020fe18a8793bf2a12ed1f46e978b90a14a9e2b1a276d,2018-10-30T16:26:24.687000 +CVE-2011-0609,0,1,d26d4363f8c440ef4d7a84dacf00d8b961324f342cff92f01dd5d12371f4ba24,2024-06-28T14:20:56.560000 CVE-2011-0610,0,0,c467e8a59910e980aa6ce8828f3680bbc6417e12d6d1f4fb713d5d3d04a72c79,2017-09-19T01:32:07.817000 CVE-2011-0611,0,0,3f709d71342533e2fba1141c571699f75c67b46c0e40fd0ff3b7e372d245f9ff,2024-02-02T02:39:19.227000 CVE-2011-0612,0,0,a63028b54ff15e3d1fd0e40392f1af950157f3cc76c979998036409a8967027c,2011-05-25T04:00:00 @@ -48591,7 +48591,7 @@ CVE-2011-1819,0,0,4f81b42ae5409c95212478c175d0f999dcba02ce5c588ffc15d62086d653a3 CVE-2011-1820,0,0,63fe5c1ba925433980bdce880db0ef2bf6dcd3a07466042cc7ff35c3dbc187f1,2017-08-17T01:34:25.933000 CVE-2011-1821,0,0,4f5c96abf7abe81a9d422d251f3b966b99f60b758f93f08cec62aeec89000e50,2011-04-21T10:55:02.717000 CVE-2011-1822,0,0,26fb0daaf32b264838c7fc60fca9f85012765a82193e7952e8b189f62ef133ed,2011-04-21T10:55:02.750000 -CVE-2011-1823,0,0,7d671e2079a22ee2f8c2b8b5b16142bbfda64006e952a449815004a15d8e85a7,2023-11-07T02:07:14.530000 +CVE-2011-1823,0,1,47bf508a03b7501f8f9fea974774dc48d9c7d53abefb653a8cb00689e42a94a1,2024-06-28T14:02:58.183000 CVE-2011-1824,0,0,f80ce4960749ddbabe91212554be5ff4948472b659cafc7877fe23aedd9b6bc1,2018-10-09T19:32:03.680000 CVE-2011-1825,0,0,871e4cec45b095e15954e52339d0f51cec8bc5a7ea23695fcac0fc79e60d2c1c,2023-11-07T02:07:14.663000 CVE-2011-1826,0,0,0b148b6fa21e89e22e3ad17d85535950d9a41c60218c83a659a3d8c8d720d0b9,2023-11-07T02:07:14.737000 @@ -49174,7 +49174,7 @@ CVE-2011-2458,0,0,c2d2b750400b961300c1af8ec965c651e42b6515eb4cfdd05d59435ba34185 CVE-2011-2459,0,0,aecc5f1e2e2207a002f0c0cdb70fd45b7bdd95b977e27d457fc9cd0bb0548eb5,2018-11-29T15:38:03.487000 CVE-2011-2460,0,0,1619410c9eb194fdca307ffcef963d268bac355afa6e928c7eddab799e3a0698,2018-11-29T15:38:17.707000 CVE-2011-2461,0,0,b1dfb0fc6621cffd8dfc70d31f0d057a813bfcd377dde5ac2e2226593da492ec,2017-11-09T02:29:00.277000 -CVE-2011-2462,0,0,4d13f191a724af7113a158688df47583a6c8ac62c3921f1fb601993cf0b613dc,2017-09-19T01:33:04.537000 +CVE-2011-2462,0,1,5ca69771188ed8b49338a29ea0e6b7749d4990aeb1e6fcb84974cc33c795d87c,2024-06-28T14:21:09.670000 CVE-2011-2463,0,0,9a9e62505ceb01a4b393ce050bb2f29362425131d76df2f0700951a7a234a475,2012-02-02T04:06:11.910000 CVE-2011-2464,0,0,20869d2b9abc9cdcee6418b6b97a468fe87fd20381b3548b26b975be2f6bb5f0,2018-10-30T16:27:02.577000 CVE-2011-2465,0,0,32e02d2ba84cf729dd481dc464a8bc96c87e88465483946245c9251bf698d659,2018-10-09T19:32:26.743000 @@ -51960,7 +51960,7 @@ CVE-2012-0147,0,0,15b61ccac1183c3c3b3d632aaecbfe435fd07d8b84e31ce63530b901d91a05 CVE-2012-0148,0,0,422a084ed882fc0ba0bcb900cfba6b29c1bca2647fb73d5289a5774446e13a39,2023-12-07T18:38:56.693000 CVE-2012-0149,0,0,0420d04b5a810ab1f26a1b04e06f994912075cb1a08325a0adb9ad81e9440ec3,2019-02-26T14:04:00.993000 CVE-2012-0150,0,0,744347cb03bafae8fb15f39094a508824f1fbfcb7c13847e9496871613d98db7,2023-12-07T18:38:56.693000 -CVE-2012-0151,0,0,3026be4e5e10553ea31985a82a02311827ac460a1df79a8f76d13e588fcb0337,2023-12-07T18:38:56.693000 +CVE-2012-0151,0,1,fd9e1329fb9547c2d5d1a8b68c430bb078c852e21cf6fa8d5fd4d0fce41a5764,2024-06-28T14:18:07.717000 CVE-2012-0152,0,0,32bcc6d144f6323b97086e8358c939aa82eac202be412b26d11e6922baa767a9,2020-09-28T12:58:30.503000 CVE-2012-0153,0,0,eff0b4bc776a2dd7b90b6ff97d4b2527695055c4d9d41c7d46969cc207447bb6,2023-11-07T02:09:54.813000 CVE-2012-0154,0,0,89a3d3bfc380b07470c34481be780644d96dc4d7dce8259d556b3fc757a3001d,2023-12-07T18:38:56.693000 @@ -53530,7 +53530,7 @@ CVE-2012-1885,0,0,1fc79176c338ecacee4091c3e04dd7efdd5a7b2fb28da5dbbd44e1ad829169 CVE-2012-1886,0,0,fad33287921d8c61bf34a852f178af37af0af37e21b3c91862d3df86e8a11725,2018-10-12T22:02:56.797000 CVE-2012-1887,0,0,04d170ab254217ab1896c8b4f1356ff6f8e751ce842efe762f89a43c17ad76bd,2018-10-12T22:02:57.403000 CVE-2012-1888,0,0,f3c955f8ab9067830b00778a87fc036b6e3d717eab5a535b8e5d01502ec20888,2018-10-12T22:02:58.123000 -CVE-2012-1889,0,0,d1d039b944fb3cf5ba6385a195c74bf25cc76e78ed9118721f6ff4c6bcc89456,2023-12-07T18:38:56.693000 +CVE-2012-1889,0,1,7253a2bb5fa38cf8491d85d48649d85658c6823d60241935e695a8d37583d666,2024-06-28T14:18:20.617000 CVE-2012-1890,0,0,1f2f4f520fcca21fe023a0f0210ed3598e9db7c3fdb71254abfe4d416da26780,2023-12-07T18:38:56.693000 CVE-2012-1891,0,0,0233958075d5201cc22d68d9a982ab4580bf174f4115644d1836b9cf48d3a1d1,2023-12-07T18:38:56.693000 CVE-2012-1892,0,0,a9a913e1697bfa881f5af08240a6d844cfd9e61237b5d19722a39fe162afeb6b,2018-10-12T22:02:59.733000 @@ -56297,7 +56297,7 @@ CVE-2012-5049,0,0,9b22987366eb4aae26e81bce62a3eb1ce800f90e0c410f5f9ccd72b97a0c2b CVE-2012-5050,0,0,19da294e6137c1d43b50a22a7324e40f7d25eede15c901223b617cd59d50e779,2017-08-29T01:32:27.713000 CVE-2012-5051,0,0,debbad6018d1987b0780b628595765c6263a0facb0970d8e8b40aab83dce9e32,2013-02-02T05:09:14.223000 CVE-2012-5053,0,0,0c2a490ac02e38630565546ceb4adb6941891193471b6bf97e7909acdfdfbca5,2023-12-01T14:22:25.610000 -CVE-2012-5054,0,0,5ad6a69f78fd0891268065b1baba25395c0f0a591677c09479ac3d05b1bb7ffc,2018-10-30T16:26:24.687000 +CVE-2012-5054,0,1,6fc6dc1589202065d60501cd53c59f52ff0f7e9d1195074e72cc69de35021ffa,2024-06-28T14:21:19.573000 CVE-2012-5055,0,0,51457e17b16372b2758e4fd0ef43c0cfbde19922123bc45a756097f9b40e2112,2012-12-28T05:00:00 CVE-2012-5056,0,0,27169a11e3219f87e70be5d4ecc12893f46deea47501fcbca22e8f1ebbbb5590,2014-06-04T17:15:23.240000 CVE-2012-5057,0,0,a87c825d0b1244e4cc174bb03a631846007e53df7b097a57938244d91fd528db,2014-06-04T17:19:18.147000 @@ -58983,7 +58983,7 @@ CVE-2013-1327,0,0,975f670a292d1b3dd685ea878fdb25b3c350f441afa239dc6ed687d0605f40 CVE-2013-1328,0,0,3f4c8e4376f00362002695675aeb9ca3fd079d7eb5f258a9a1d55605c0d35694,2018-10-12T22:04:16.490000 CVE-2013-1329,0,0,43d5d03c64ebadb2cdb8019ecceef3676bfa5d29602f46a8ebc5c21967353e8a,2018-10-12T22:04:16.803000 CVE-2013-1330,0,0,dae3f45a4972c3e18f965f0f12a5f05d9c19de3c6ce076602aaaea9d555f34a9,2018-10-12T22:04:17.113000 -CVE-2013-1331,0,0,88b8a07d54e73c5f5a5863db4e153b31c1b1f27f62e9a945558494c82ead0a78,2018-10-12T22:04:17.583000 +CVE-2013-1331,0,1,9ee73aa7460e2671f302be381e86d24a2982c88faebee6170da840b0b32a9aa5,2024-06-28T14:18:56.450000 CVE-2013-1332,0,0,e5cb1b58b52e2bd8a6109cf7813a089d1d82ea278e98c17aadce322b61db7be0,2023-12-07T18:38:56.693000 CVE-2013-1333,0,0,caea90b2da35b2b1c3d3273affdf60360133b16b45f406caf7eac3e0276330c5,2018-10-12T22:04:18.397000 CVE-2013-1334,0,0,3577b6f8c75c3aaaf468da8e2559efaf2d8edb8a01b37238ff85ef4f5885e63c,2023-12-07T18:38:56.693000 @@ -60146,7 +60146,7 @@ CVE-2013-2585,0,0,67b134a63691406bf857c54a16e3af825e65ad2c054b8ac05a80bd30925603 CVE-2013-2586,0,0,6247bada903a8a9b88b2da4cc2c102cdccf3e87afd8721e9617ad13abd35f1f5,2017-08-29T01:33:15.950000 CVE-2013-2594,0,0,bbb9b92d7ebe3b29b3e91187185f1927ae691649e39f4313e5b4215eeb66a716,2017-08-29T01:33:16.010000 CVE-2013-2595,0,0,4f18461f61dcde1ecb0602b4cf88bfdf0c51b99db7aeb373aa5bbd8605b72c5a,2014-09-02T18:41:19.657000 -CVE-2013-2596,0,0,c8ad4061781da9eeeca7f38dbdf0d33e9f1aa1b9c1f69e13a24406870bb1a4ff,2023-11-07T02:15:04.780000 +CVE-2013-2596,0,1,7fac822a3ca1dc509898fd2832af4489f2747cdfddd6d330e8efac75ec1a8fcd,2024-06-28T14:01:45.387000 CVE-2013-2597,0,0,aa77f6b3d6622c4a08bd57823d34f41152bf26d96f2afc12e86612b50b9633b3,2014-09-02T18:43:12.043000 CVE-2013-2598,0,0,9a1f7f70147ffd184f80c1f34fb07dbe6ae7be393084940bd8af9b7ae4c9d5a8,2014-09-02T18:44:44.573000 CVE-2013-2599,0,0,b298ee6bc4878cc99f8077e6829a9a2e06a094a1b30571f8c08d928f5131e01b,2015-11-10T19:09:34.907000 @@ -60628,7 +60628,7 @@ CVE-2013-3159,0,0,43d06f0b8be1d5a0d95009d9eead463c316b93bd478b2c9e22115f224dfd1e CVE-2013-3160,0,0,879477ecb6408dc7e5284f4930a8d2a40d51ddc8fe2fd38c4e38941355f8cee4,2018-10-12T22:04:41.180000 CVE-2013-3161,0,0,1918d0b7c9c5b783ec8053d98897373b178bb59f2a042ce2666913ad402ba4a1,2018-10-12T22:04:41.460000 CVE-2013-3162,0,0,0326db1d7206befa234ed24087e9b255855644f2cd9d34df640c2678c960ad2a,2018-10-12T22:04:41.757000 -CVE-2013-3163,0,0,5b46969c2471887f3ae19d62aac5c6003caaf5276f5f2389bfdf5f47e1a4ad25,2018-10-12T22:04:42.053000 +CVE-2013-3163,0,1,9bea42c3f2d8d27eaed11d9b423947f89748a52078a73d76911b7b1b641920f2,2024-06-28T13:40:22.220000 CVE-2013-3164,0,0,7ce807c83d7ee38e39f56b87178a6cadd33fe5f7730057570f85b86e93e58a11,2018-10-12T22:04:42.367000 CVE-2013-3165,0,0,1670531d4d9cd6a6639b5e6bc0fb4fbaaeee6dfd976c694d651cc7966e73d604,2023-11-07T02:15:52.320000 CVE-2013-3166,0,0,f72d2844e4154438b8d33fdf37ad765bb99d189542dccde5b34a6de9319e10be,2018-10-12T22:04:42.647000 @@ -85019,7 +85019,7 @@ CVE-2016-1642,0,0,4e0c1da0e20062de567c76d1caba19f84c25c8d847c2da84d7a947cb96c366 CVE-2016-1643,0,0,9951903a66ed92363aa64d82f3fda4dedaaa51f34b4c36d4b5c615079e0812fa,2023-11-07T02:30:18.670000 CVE-2016-1644,0,0,29709de5622cad7d3bc2ede7aaeb6eeda1d348d1416a92b0a5bc5eb3a37a16e4,2023-11-07T02:30:19.230000 CVE-2016-1645,0,0,ca8aa7ff3579df89d08543ff39944231d8bba4c89e5ccbaad88a641faeb25e2f,2023-11-07T02:30:19.643000 -CVE-2016-1646,0,0,b28de89d9f3ec2d2162f53afcc912b99849fd07e462a1d5f15283b51b73c950c,2023-11-07T02:30:20.167000 +CVE-2016-1646,0,1,4347624c29fbe44dce9241dc2175f3eb29c99d623abce0c639226e31ee56effe,2024-06-28T14:19:18.833000 CVE-2016-1647,0,0,0bcc84bf633c77b352acb9d0b1bfb6b436fcbf587af49391879fac0e1da2aeea,2023-11-07T02:30:20.540000 CVE-2016-1648,0,0,a22cc81f9db1c723934798b46cbcd655421e020539d040520d07202a2396f9e7,2023-11-07T02:30:20.970000 CVE-2016-1649,0,0,83f8cb0116dca08f7fd7f6a694112285aac1da122f8923d5dcb4c59541e2ae3d,2023-11-07T02:30:21.420000 @@ -85375,7 +85375,7 @@ CVE-2016-20017,0,0,84240a2633f419317224c25b880c4139aecb2389b629cfc9cb0e9395b1920 CVE-2016-20018,0,0,7de90b74b3b39e0aa12d4941c22aeb80a46ceca1e99a066e438d75504df97110,2023-11-23T00:15:07.650000 CVE-2016-2002,0,0,a377c8708377b348d449ba7584bdb321aa5bf1a690c83b9217b505863cfa2334,2019-02-20T19:22:14.107000 CVE-2016-20021,0,0,a7989d938669dd6faa4ab43d7c28258daa7b9f268efc78df3cc33edeb7f6459e,2024-01-22T16:27:08.217000 -CVE-2016-20022,1,1,9f0c0f2ca038ea57c5926b25b999a7b9f31579f5e06d706eb892e94a3fcd1095,2024-06-27T23:15:50.127000 +CVE-2016-20022,0,1,7f387d2f22f948331781bf0ac7a3799d4e9e0f9b666336d409c8aab9ccdf3b7e,2024-06-28T10:27:00.920000 CVE-2016-2003,0,0,ef92d33c31d79ff1e222a472e27216caa5ddc6f9832da9c558550cb94e6bc593,2016-12-01T03:08:18.587000 CVE-2016-2004,0,0,300990f44934831268ab5a531d51931dfe9c8975235fbadaf00ba410eecd8abf,2019-07-12T15:15:23.573000 CVE-2016-2005,0,0,ce5e726340baecffb6d6f06e6acd6845635acb44af2bbd209fe985d42de64dee,2019-07-16T12:23:19.377000 @@ -88390,7 +88390,7 @@ CVE-2016-5194,0,0,b9da3e14494b71af86a2bf87dfaaedbe3f5ce7ffc16b19ae20fb0e6f3e1a66 CVE-2016-5195,0,0,dac0adafe80970213bc09e3fbb5aee517bb914fdf912fa7097a397d066bd0990,2023-11-07T02:33:23.770000 CVE-2016-5196,0,0,2d9de77b890b923ac7733e6b848f739da10aef6b6c8656434d20c823e252216a,2023-11-07T02:33:24.627000 CVE-2016-5197,0,0,90bfaa90dfa16f7dd0ef5b990f04e720367f0073382e293617c2f7059d9c652c,2023-11-07T02:33:24.923000 -CVE-2016-5198,0,0,0748e3ec2c193c5272a5409a2c54f568bfab0d634ac0edaefb452fdccce15e4d,2023-11-07T02:33:25.190000 +CVE-2016-5198,0,1,3e009606d0409b703291c8b166e5a9033b3b781dab09c3f95bec97735bc371bf,2024-06-28T14:19:29.210000 CVE-2016-5199,0,0,0347e43fb76ab6d7b16b37329e12d4cdb57dcb68d738381168cd6d3067a0b4bf,2023-11-07T02:33:25.437000 CVE-2016-5200,0,0,e537372a33d65bf125abcdc5fe29642b72b4b4ca0e4bebfab6d76de64585236b,2023-11-07T02:33:25.807000 CVE-2016-5201,0,0,018c8b04ef19caae49de5ac76f30c7d6953891078fd59f8ad193fd82a3686e3d,2023-11-07T02:33:26.163000 @@ -95310,7 +95310,7 @@ CVE-2017-11353,0,0,05ee8d7f32b1ef4de0d47b505bfa91348226dfca16dccef85ad805ab9f25c CVE-2017-11354,0,0,8bc1d77110d27eb8e6007347555a0c20875fc4642261ad3634ff68b4edc191af,2017-07-20T20:02:05.627000 CVE-2017-11355,0,0,8d42210a316dc02fa9d1075eb8627c1deb1ded7ce81bd92c43a3a57211c0c732,2017-09-08T01:29:55.483000 CVE-2017-11356,0,0,7fe7582dd6532760fc6e4e86e4e46f4354653a0a82214f90fda513cfd5298bc7,2017-09-08T01:29:55.530000 -CVE-2017-11357,0,0,ef50b39b369244cb1c8279fac9f59eb6609b4d76f797db9d3928c5851ef03a2d,2018-01-28T02:29:00.347000 +CVE-2017-11357,0,1,88b0d2125f01cf404fa53e7ed4f8061bfba43b039ac2e21c7f418958115f93f7,2024-06-28T13:44:56.063000 CVE-2017-11358,0,0,9b30f9cfaa9291befb62304f79cafe878f0b772ca3e66ea29ab0b73d38e584a0,2023-02-07T01:15:09.150000 CVE-2017-11359,0,0,c9b0912cbad7771b7c6a0cbf1dadb3558447547aef39c256508edaaf4db426e6,2019-03-08T01:38:52.707000 CVE-2017-11360,0,0,02be084975a80b6a6fdd54819c76c65cf9bfdb9587e4467019723bd94998a588,2019-10-03T00:03:26.223000 @@ -99314,7 +99314,7 @@ CVE-2017-15940,0,0,bc0afce1ec7b6aae53f41874c7ac8166f095e59e2c181abb751dc3d22a077 CVE-2017-15941,0,0,509471f4a5f1b85d5decca58a63a38b868eb59a34014ea42b45bb2a2fb14deb8,2020-02-17T16:15:20.147000 CVE-2017-15942,0,0,a0c114288f8a1e5f2b0520ae00480e6bddd1cfa7c918b8760f42cea839ea85cb,2020-02-17T16:15:20.257000 CVE-2017-15943,0,0,61dcfb045a9b41d3fdd57cfc29dfd37a618621518e3a64aa47c2ec3dacd89cd6,2020-02-17T16:15:20.397000 -CVE-2017-15944,0,0,edd723ec0a7be286ecbf487baee4d604aaade016c76272acd6a68a217779d483,2020-02-17T16:15:20.490000 +CVE-2017-15944,0,1,056117f37bf570a773a3bf15cb36f46c720f5816791bfcf364bebab067b90b96,2024-06-28T14:08:41.457000 CVE-2017-15945,0,0,3bb7bd3c3b5559222be64b0dd2d5b26baafb3fbbb786b6a6d26adfee543fcf05,2019-10-03T00:03:26.223000 CVE-2017-15946,0,0,e7b92b0af53833ee6703929c5f671207eae1b5547ef1b8b3c145a8936c8b88e4,2017-11-25T02:29:01.997000 CVE-2017-15947,0,0,53ed263488c0d968f4d54571b86c285e3efd1a9e547348f4843f3236032a493e,2020-09-16T13:15:34.753000 @@ -105375,7 +105375,7 @@ CVE-2017-5026,0,0,fb29db53bd91da7eda68bc6ad25989e26704dc03f651a861ad7818a97a340c CVE-2017-5027,0,0,ab01b5cb633104171b38f4753b5a828d14420a0fb0f8485c7be7de2fa2813a0a,2023-11-07T02:48:34.643000 CVE-2017-5028,0,0,93e371bb33b0a6e8164b4d9107cee296e1379d90c806eb066d0fd9e46d92befd,2023-11-07T02:48:35.010000 CVE-2017-5029,0,0,a330dc368ee42f8e980f7999656c31002891bc58e8033a11dc4b861a4c050f03,2023-11-07T02:48:35.410000 -CVE-2017-5030,0,0,f13c3f81f486b1f14220abf6b042ae6302e24521ea7d93e3027daa1e349de0c0,2023-11-07T02:48:35.810000 +CVE-2017-5030,0,1,b94fb67de4d7438056d258e2d284dabc8768240c89f04ed6cb8bf0effbf1c007,2024-06-28T14:19:48.733000 CVE-2017-5031,0,0,3e50671d4c27a943884974f7058d5caf5afc1562483aa3019d96066a0dc2c20b,2023-11-07T02:48:36.187000 CVE-2017-5032,0,0,addee629d6c39646809cc4c008d9fcb7cafe3a7a39777c90c8b8fcfe4ccfd928,2023-11-07T02:48:36.567000 CVE-2017-5033,0,0,78f32f8e58aeae72a0897a948b15d651dc5a4939cc98f915be9db64009d36849,2023-11-07T02:48:36.897000 @@ -105415,7 +105415,7 @@ CVE-2017-5066,0,0,157ccd85887a2846924e1ca327ce20ecdc7a7a8f43810d7d619c11b9c85f08 CVE-2017-5067,0,0,eb007cf7fc728620d6fa097bcec461beb0362010fab963da696f82609bfe1169,2023-11-07T02:48:52.543000 CVE-2017-5068,0,0,1fa38ada9a8ccdefa9e0563c7a14b334adbc7c1a7be6d7633b0c9f8e3ef20b8e,2023-11-07T02:48:52.910000 CVE-2017-5069,0,0,721035942663e9655c1de8114084bb947a0f5e5643ef20a1cc0e2a1cecece059,2023-11-07T02:48:53.507000 -CVE-2017-5070,0,0,0f843c70f5f2b4d3a896ccc55e4ae551e65d5f08056253a78afc16ea40515c8b,2023-11-07T02:48:53.853000 +CVE-2017-5070,0,1,b1e9f87bbf6a65b2e9cecf950ec06d7ea13aea4c33fd19d37fc158012a76b467,2024-06-28T14:19:57.837000 CVE-2017-5071,0,0,f83d8035acc34d8b48ebc7ea494bbb27b698e175c42bd7c9252f18d6f6897b73,2023-11-07T02:48:54.210000 CVE-2017-5072,0,0,d6ecea4843ccb53d3416e3e6fb800cd7787d4aa6d95888a02da3d689a146d151,2023-11-07T02:48:54.513000 CVE-2017-5073,0,0,b1f7be01860747f87a710422572fb4de694610a161c1d22ab3c7f5e60bc8b9ac,2023-11-07T02:48:54.920000 @@ -105765,7 +105765,7 @@ CVE-2017-5517,0,0,a10b88efbc0fc6d6c78aa534fae35842fc986e7d323089c9d040a07534cb57 CVE-2017-5518,0,0,f3f16794fd1462119295363151aa0eff928242be56a512ce72cc65a469e4ef63,2017-01-27T16:07:33.530000 CVE-2017-5519,0,0,3239c1127d2845e94f46384f0abff8eddd7542dffeb0f9f1962931871f653305,2017-01-27T16:07:05.417000 CVE-2017-5520,0,0,d3e563d1401b0175b73cd016235560b618afb3af2cad7a54fb04f9e25307991d,2019-10-03T00:03:26.223000 -CVE-2017-5521,0,0,25441ef98b110edd2b02e173c8c9e0e74efb84e5ac682b429b9d94241b43bcfb,2017-09-01T01:29:35.680000 +CVE-2017-5521,0,1,5c65133e031029aade85059191c49ce60731f4da945549b2f91c4dec6c518312,2024-06-28T14:02:32.663000 CVE-2017-5522,0,0,b7fc3ccd4f93f3cdced5a5be4eb2e512380e1cc1d39c496916a7465218c43b0e,2021-06-07T15:56:17.010000 CVE-2017-5524,0,0,a3e1ef5e469c3340b945bbb2974909ef5e10e86a74fc5a83c9a53321887b0cf7,2019-10-03T00:03:26.223000 CVE-2017-5525,0,0,c7d77be6503ef49baeeca053e74acc701773674f7a395ebb3a145d35009832f4,2023-02-12T23:29:40.597000 @@ -106914,7 +106914,7 @@ CVE-2017-6849,0,0,6d31a44809f92cfc1f2f2df203942ac5f42bd9c2326125f82766d315030047 CVE-2017-6850,0,0,eea78a7cb781a9f77550a29a9e5c9bd030984bfff74b6a9c237e2af4986a2f82,2018-06-29T01:29:03.627000 CVE-2017-6851,0,0,68b5613fd84a26f7269745db6d7b7cedc7045a577aefc45335362be55c21f37f,2019-08-09T23:15:13.060000 CVE-2017-6852,0,0,c6e786ceebd7d2937ba5bb1bc70558a3919decc1bc0c41fcd23cf2e37f5cff49,2019-08-09T23:15:13.373000 -CVE-2017-6862,0,0,6e5e309a942b5acd357b92d053893a9aa0c45d52c43f03c3a0900997d86b9100,2023-11-07T02:49:58.757000 +CVE-2017-6862,0,1,a97c6e6bb57160ee063794e6cb7a3c49e9b19dfdea6d552c15de47d6b14a77fb,2024-06-28T14:21:28.377000 CVE-2017-6864,0,0,9102c4aa7cc51e8f304873bc996f7903ef2c59cc73213c520f738fbeda636a59,2017-07-12T01:29:19.097000 CVE-2017-6865,0,0,8e04413189b9dc94f2b8800d8057357ad2b491b48ce68bd0bf4cf7bfffdc9281,2019-03-21T16:29:00.407000 CVE-2017-6866,0,0,f188e7c4762c2f2a26dadc9e648d73da925301c519708db892327593274d451a,2019-10-09T23:29:20.123000 @@ -114203,7 +114203,7 @@ CVE-2018-13367,0,0,47546177f4dfa3eaeb89861e61ccfc7ce423de7bc66d83ce919897d6accf8 CVE-2018-13368,0,0,dea7eaaa3a8504b64a1cb6b4b7250175a6a2cff890a31b769e0eaf353b6efad4,2020-08-24T17:37:01.140000 CVE-2018-1337,0,0,68c0472a05657c3bf4878627476d0d5ecefaaf2b015c76bacb82cf4b1e880b5a,2023-11-07T02:55:59.343000 CVE-2018-13371,0,0,8a38736ddaf017d4b8e2790596c329172d6894a19ab658c4bbd24e3ea798cf32,2020-04-03T18:53:23.173000 -CVE-2018-13374,0,0,dcc74931c963664c53127268e3f7f191aaa58b3c0a0b2e3a0b9c3bc639227689,2021-06-03T11:15:07.707000 +CVE-2018-13374,0,1,d8d3cbda0879903d9708fa8ab377ca18fce7fb90f58417b260f2dbab0b870929,2024-06-28T14:04:14.410000 CVE-2018-13375,0,0,0f8b808b929d56e9a6e5cf1bd2e35b240cb10555febbba977efbb53013a3b8c3,2019-05-30T15:19:19.737000 CVE-2018-13376,0,0,54d3c1718cbc52e2e807d457d3ac76748b42b9a3497452b2623ad6a89b2a05e3,2019-10-03T00:03:26.223000 CVE-2018-13378,0,0,adc9e9df0a4b2494c3949475fb53d7f952e6f7f62ad2e595d572371a05a6e54d,2019-04-17T18:06:24.997000 @@ -117631,7 +117631,7 @@ CVE-2018-17459,0,0,307b1df48dc85e823ba6e235a723fe40909583d330125f6d21f422ba5d0b3 CVE-2018-17460,0,0,ee6291a944c72761552697a658a6e2ad69fc7563f3e169675e2f76afb86fe854,2023-11-07T02:54:22.433000 CVE-2018-17461,0,0,cc036e70bafbe1beb7f8030d0418e70a2fd114110491ad72ec23129803a1f767,2023-11-07T02:54:22.850000 CVE-2018-17462,0,0,79a73cf31237950e49be8c042143ab9226de54107604653ab0727a2582234908,2023-11-07T02:54:23.300000 -CVE-2018-17463,0,0,3b2352433200f72235129227ed8c53daef8fb60571cffb54d50c830ff588c535,2020-08-24T17:37:01.140000 +CVE-2018-17463,0,1,5d19486d8e2ed7cc8c0e1ff043ffbd9f4a00d811760c8a5d862d83bf856e08d4,2024-06-28T14:21:46.070000 CVE-2018-17464,0,0,3b12de92e0dbb8054f6a479095898af10d515c29120eab40a09ff1e267195bc2,2023-11-07T02:54:23.720000 CVE-2018-17465,0,0,b779e181e05be26caf42514f91d670e0ebc4910eea812cb498b7a49f1f814c4b,2023-11-07T02:54:24.080000 CVE-2018-17466,0,0,d77864c305ed5d48a4385ada7a2482ec9dfb76e5dd64da5ea64aa2b18289b6ad,2023-11-07T02:54:24.570000 @@ -117649,7 +117649,7 @@ CVE-2018-17476,0,0,e6c0eb41ae0d4d42b4818aa520454e6593f7e9488797daecab26d4b3fc406 CVE-2018-17477,0,0,905e96ffa40f9e2545d749dcb92f0d6b8783c252500dd137704b79b7e9aefa09,2023-11-07T02:54:29.180000 CVE-2018-17478,0,0,e0bec7cad585f6b2593a3b5c663c392d015a9183aa0d6743e9783e4a0819cabc,2023-11-07T02:54:29.543000 CVE-2018-17479,0,0,05ef6f52bb0200399a628d27aa78e47da7e2140a0f663f3db0e13f283aacb2b2,2023-11-07T02:54:29.927000 -CVE-2018-17480,0,0,a6e513f5ba679ca033aa8753f5c6ce7688e52ecf13463f6aecea2107af9e53b3,2023-11-07T02:54:30.293000 +CVE-2018-17480,0,1,c17ddecd3c6da9b87bc42e5eac27440d9d62d98c2c1076783b8d5335bd251fe3,2024-06-28T14:22:08.800000 CVE-2018-17481,0,0,a75850a517965fb6b8bd931f500364bc465272a8b750fcb0cdf7ea4692808b1b,2023-11-07T02:54:30.680000 CVE-2018-17482,0,0,90bf327ba0c5c8fe4274ac2e91db17a6b92075b523faf75c71868c1450113055,2019-10-09T23:36:39.223000 CVE-2018-17483,0,0,f28710b9c435eb9eeeedb5ad6f82b53d86c306f3805556c14bafb58b3103180c,2019-10-09T23:36:39.393000 @@ -119129,10 +119129,10 @@ CVE-2018-19312,0,0,3e646dce12a85ab31ebdb9b917e7e6ce10c904ee627cc79dc6e8bcd0f6938 CVE-2018-19318,0,0,294002aad8721c5e1101f80be1fbeb98605b280b46cd0a456269b11dd24ce431,2018-12-17T21:16:48.507000 CVE-2018-19319,0,0,635d6be1dc43b15064706fcd8add92764a0194f0f150ded16685f6f727be9c74,2018-12-17T21:15:31.503000 CVE-2018-1932,0,0,d07c1b9c79da47cb60e9bcc3662d90292738696dc49cc96926adcc638be157e0,2019-10-09T23:39:22.727000 -CVE-2018-19320,0,0,811358721e10f7f8ec4d6eb5f665e3188f9409798a5ce97505d39b36ad57f981,2020-08-24T17:37:01.140000 -CVE-2018-19321,0,0,b1c12511631d2c2144e7b842ddc451d1af3f340fcfaeacfd9f53e70bb271e09d,2020-05-19T13:15:11.107000 -CVE-2018-19322,0,0,c30a565b702826f59df339f980be7d123267140d9b32af65b9a297da042cb3a2,2020-05-19T13:15:11.200000 -CVE-2018-19323,0,0,b952d2878eaa5f96fb5339f71741a093dffb15f53cafe07d95c421ff863d03e9,2020-05-19T13:15:11.357000 +CVE-2018-19320,0,1,843b414c9d0a685063e546eb66c9c8a29d2827715bb6b265ce99d9213ae12f89,2024-06-28T13:55:33.170000 +CVE-2018-19321,0,1,5761b8c3b85b9b36f9e5d7a008566ff3066fa4aa4e0461997fd002062129f8aa,2024-06-28T13:55:54.210000 +CVE-2018-19322,0,1,fe0a246320333a2c8c3b5916025de841f2c04f8a95b62fc6df526cb34f7b14e6,2024-06-28T13:56:22.943000 +CVE-2018-19323,0,1,362c37896d51389dbd9771ed30bb5d5e0556d3ecd0d9655762b96040a59f92c3,2024-06-28T13:56:35.130000 CVE-2018-19324,0,0,e94be345f272c3c0bdc7e0d61f1a4e5b71fe1c96bc9cd82528d8a35c63c12064,2018-12-17T21:23:25.427000 CVE-2018-19325,0,0,39055f1affdeabdc484f360dba9a06d8ea56553cdd60ba837d3898acf3b84e26,2023-11-07T02:55:31.520000 CVE-2018-19326,0,0,c7b18e5f53859113abfed66ff228942a15089622a90156262c5d31f1c1ce5ec8,2018-12-17T18:10:40.350000 @@ -123880,7 +123880,7 @@ CVE-2018-5426,0,0,4c29aa6979fca2206c428e457be167a683729154adc2b14825f4024ccc01e9 CVE-2018-5427,0,0,fa34c3ac478f2f489d73dab0457c01afecbc17afffc62f29de6dc64f282def5d,2023-11-07T02:58:46.400000 CVE-2018-5428,0,0,d53c6e6fedc5216803f35dfe0ad09187e8656946d102c82450db5d60d3dc16e3,2019-10-09T23:41:19.953000 CVE-2018-5429,0,0,e80b9964936eb76ea5cacde6229d8c4a61145c53d2f5edb5cd381eb45c2a48e0,2019-10-09T23:41:20.110000 -CVE-2018-5430,0,0,3c7fea5f2604c7dd1b5846314260a79572c3c5844af8277b36e67df3da0853ca,2019-10-09T23:41:20.280000 +CVE-2018-5430,0,1,6b569ded2b4ee2c67a3386bc19872871bae5d076d92e2154f1714cebf1a7a35a,2024-06-28T13:46:02.897000 CVE-2018-5431,0,0,99351098ad30f5e7cd7f84868bb02fba93a6857ccba20af6d58fa26e9d3f5ecd,2019-10-09T23:41:20.423000 CVE-2018-5432,0,0,498766394cef31d784f710efc09b6b399b5a70f4fc6b8f2af856029a0334cd6c,2019-10-09T23:41:20.563000 CVE-2018-5433,0,0,8162ddc618d3c9176471792c0f942fad22a853d338956361816c6d560fcff6d9,2019-10-09T23:41:20.687000 @@ -124370,7 +124370,7 @@ CVE-2018-6061,0,0,de01fff7eeb8dc59b685720614bd222351f47a756e0df7dc205bb39742803f CVE-2018-6062,0,0,6c23a55e79d5a39cd0085c0f043d01e561ac3c845d28fb0d3f3f6a8467a0d395,2023-11-07T02:59:05.823000 CVE-2018-6063,0,0,b7b09b1c6bc376b8705f1ef1ea5b0463f2e8a11a41f58f2bf8bc76d7dcc532ce,2023-11-07T02:59:06.213000 CVE-2018-6064,0,0,92771c4c01f3cf14e2fecbb104ed924408910f3ce1300bfe3fd7d5f746fdfe59,2023-11-07T02:59:06.650000 -CVE-2018-6065,0,0,6266699885dfcc829dc927d9abc17133ab852fe949c6191ab7b8ab4f5df63ce5,2023-11-07T02:59:07.077000 +CVE-2018-6065,0,1,d965becfbb34378291f3f89632dca735351d2eee0fe6de179a6efaf495cee065,2024-06-28T14:21:58.523000 CVE-2018-6066,0,0,d8b12eb28b2ead972998a5eb69e36955658f370f7bf2efd0c28fc0b4a6ca1368,2023-11-07T02:59:07.510000 CVE-2018-6067,0,0,5f53574f33dd43a6687a1e781bc34ad34cf592e11b8ed243e8fdc8a962090b37,2023-11-07T02:59:07.950000 CVE-2018-6068,0,0,7045c5d9ed77b52e73c716aac7ff49ee5654c80143206957833c1852d4a9f9b0,2023-11-07T02:59:08.400000 @@ -141781,7 +141781,7 @@ CVE-2019-7183,0,0,4467941f6599a4a0dabdba2ffaa77985d3bfa1e43198deae1c804a8e136455 CVE-2019-7184,0,0,38bdbcb50c2345518fb02ee561a14c9edf64efe80fc97b3c3a68b057ab7257ec,2023-01-30T18:27:58.297000 CVE-2019-7185,0,0,a42e02aa2d01c7d03fc092092e284a860d9c53e9f3ebafff4402743fbc4d5d76,2023-01-30T18:29:46.067000 CVE-2019-7192,0,0,6f8d5611770efcd07c5af4f9009c8ed0921da55949b2b3b642559ae14ed9bcc2,2022-04-22T19:59:01.857000 -CVE-2019-7193,0,0,f66f99f5882bef9a74d80a070f14aef76c0c0ae61126ceeb869032e1ac344189,2020-05-28T18:15:11.127000 +CVE-2019-7193,0,1,9972b95c8a0c58dc297137eef261f52f2c4c91dd44efe5e623a722373708d1e0,2024-06-28T14:21:38.963000 CVE-2019-7194,0,0,cbb88369bfe57a40625bd17799eef1288513b702a19a5d5607dbfeb4dead1a18,2022-04-22T19:59:06.577000 CVE-2019-7195,0,0,3c94d8f3a30e03b2d5f7ae46efac199f8d8728d17408f6e06c96ba1de1dd7cdb,2022-04-22T19:59:10.263000 CVE-2019-7197,0,0,deafed7e8a02c2bad7cef51b98dfce4818ec8ca7bcf6750f6aab3d926fb8397f,2019-12-06T19:14:48.177000 @@ -157116,7 +157116,7 @@ CVE-2020-28945,0,0,15fe72a42ec41b0479de611bf8aa7e744b3268887afb81460b739b2fa5575 CVE-2020-28946,0,0,9e8d046e68c28e1336412bc52f881d918f7aad1718849562cfc80d21da4388fa,2021-07-21T11:39:23.747000 CVE-2020-28947,0,0,1e1f9454a50043bc645a26ebd1ab58cadab64f86f8bdee79efb5b343e48091c0,2020-11-30T18:37:08.937000 CVE-2020-28948,0,0,b8498b4d3d9e24ec37032501e36dacca796f37dca74bc64c1b8fd3bd99940898,2023-11-07T03:21:24.877000 -CVE-2020-28949,0,0,b468ee3b3ecaeee1334fbc9f3c75e4163186106cf9ec787f97fa726b8b1f5d8d,2023-11-07T03:21:24.953000 +CVE-2020-28949,0,1,472c48706c6e2f86efe4abfcb7c096d1b423ccfb90e28c0e0eeda14c8b963c74,2024-06-28T14:06:49.747000 CVE-2020-2895,0,0,33df1d5f33523862b9f4f7f731af2ab592ded7cbed19575353463b49bc47dca4,2023-11-07T03:21:50.170000 CVE-2020-28950,0,0,984afdda38983e057f5a209331d7358d20e38e290aeb18ff20751d9ac7b8d8ad,2020-12-08T17:32:06.360000 CVE-2020-28951,0,0,87538ee9a9434df1852326891061bb141a2e965ba1dbd4bc8a4ffd944ebec99a,2023-11-07T03:21:25.047000 @@ -157867,7 +157867,7 @@ CVE-2020-3427,0,0,7ee8c8bc5d9bb9820cc4c118a9d4a6702649024cfadfd65925f025764828b3 CVE-2020-3428,0,0,83e096f9a01178234c5fd0bd43944875fc295de08127024ec533bb871a051e7d,2023-05-22T18:57:24.750000 CVE-2020-3429,0,0,e59e223f5b2f9c02c4c011953a3a4cb371512f8d837a9a5e6664d2b40a09f6c8,2021-08-06T19:03:16.813000 CVE-2020-3430,0,0,c74e3f6e9f611ee638bc0175efdc912334d37dd582f2d005d15b4e28b0861772,2023-11-07T03:22:42.457000 -CVE-2020-3433,0,0,e24a428ffaebe9a385c85b743fcbe6416a7209923893463295da0a9e3ba74ade,2023-11-07T03:22:42.623000 +CVE-2020-3433,0,1,3b06a9d2e8ef57e126e735879ff9ca23b1992c90afe9ea757e8d229c41a50c53,2024-06-28T13:56:43.943000 CVE-2020-3434,0,0,0ef8ebdb58a15124ca0d0867df6cdb4cac9730df7a4b065da6018d1703695969,2023-11-07T03:22:42.793000 CVE-2020-3435,0,0,28944db35b149da8f5d8dbdc99dda28c81fd3fc34e93bcbcc96e97fa666b08a8,2023-11-07T03:22:42.963000 CVE-2020-3436,0,0,956c2756a47e14aa233d1d72197ee598f99107d5eac1b3048ab6217ac6a7d9ac,2023-08-16T16:17:07.960000 @@ -158759,7 +158759,7 @@ CVE-2020-3619,0,0,d3e13c14bffb732c853b50a299f3016a359237bb4c59b8dfc342a9157590b3 CVE-2020-36190,0,0,470d3b26cd8e53981d112464635c2102b1d0bebb47207c150b96231815fd5584,2021-01-14T17:44:01.357000 CVE-2020-36191,0,0,ccad7c728a6e300990788f55f7652ca366dc620ca9bfc96b9e8743c0b8f4ebcc,2021-01-19T19:58:18.743000 CVE-2020-36192,0,0,978f54b92d1cf7ea5446608a657c68bce8e0c3702dbb67c73051afb90c4abec7,2021-01-22T19:41:13.937000 -CVE-2020-36193,0,0,d167fc4033dd6aac5ef4c5d200df47a29214d67448dae9e759f74b51130311d6,2023-11-07T03:22:06.837000 +CVE-2020-36193,0,1,5283e6c8e3a1615dfefa571c91b1f49f2ce30bb8f45fba87cf4abdff18ca3b72,2024-06-28T14:07:11.397000 CVE-2020-36194,0,0,866d5030dc76d761519ccf0cd3f5cbb5fbc218b6625f1ac0f76068aad5c189a4,2021-07-06T17:54:49.080000 CVE-2020-36195,0,0,dbc11821504d3412ba0319afb7e6e4044aee263eb58aa14f80abd1a927fa6c69,2021-04-23T14:12:11.347000 CVE-2020-36196,0,0,25e289619fcda242c800eb8bb2d217e5df643e72d1ee9f21c6ed0e58bbb9b153,2021-07-06T17:55:28.580000 @@ -170051,7 +170051,7 @@ CVE-2021-24267,0,0,2d9ee31c58dfbe70635175589afc46020a40a88d52d0fe367d6785d1447ee CVE-2021-24268,0,0,8bde5c7ff18429f19a89f2e2cdce0b3bbd6f2fae3a3c64122bc18aedb3e21959,2021-05-07T20:15:19.223000 CVE-2021-24269,0,0,3f0a5ea492b28abc7732a025c144dd05e7361bcdd0b86885235b0f57ba1756fa,2021-05-11T15:19:48.170000 CVE-2021-2427,0,0,53cceb7e767e6cb0a50d33443c0256633e71aaf4c2fd05d59dea5261a6e4b921,2021-07-23T17:52:20.053000 -CVE-2021-24270,0,0,529a58d7d4d19352ab6478f84fb23428d937a296be073253fe589f89c08570b8,2021-05-11T15:23:43.510000 +CVE-2021-24270,0,1,d3631e5303f9863dfdba2ed51a71226e673c4c0ae2b4f3c24af7c1f7935f2f90,2024-06-28T13:34:04.863000 CVE-2021-24271,0,0,3f0ae9e7ee6b3c2a378328e3d8ffb6509c38a2f0fb587421b96d5d73c5d6c152,2021-05-21T15:20:04.890000 CVE-2021-24272,0,0,947b601a15aaf90c629f697712c0c878eeeb6c005471312d632e3ceba20b716b,2021-12-03T19:59:48.200000 CVE-2021-24273,0,0,892d521f0b3e606767a016f17f57384b533a3255237ac7590e1d7d44aca82e34,2021-09-09T17:42:59.137000 @@ -174546,7 +174546,7 @@ CVE-2021-3053,0,0,41078f44dfd4ded9c2bbb3846a97b35676d5976e54ef13b8a42eb8d4631074 CVE-2021-30530,0,0,917e584dd6cc6b65aa818318811597ae75054cac5f1df19c4e96637cbde43784,2023-11-07T03:33:04.593000 CVE-2021-30531,0,0,fc8ff06fa29be1302a31d1f6fb305d41d28f7f98b7ae03b45bf1991efb4dc548,2023-11-07T03:33:04.653000 CVE-2021-30532,0,0,e66ca28572b4a21a571890223b6583bf7d2fecc16db766cf491bf5346d00baff,2023-11-07T03:33:04.873000 -CVE-2021-30533,0,0,17d3db969a979b104f0ba6ae755863779360c34184053ad7c5f5c968f67368e3,2024-02-15T02:00:01.650000 +CVE-2021-30533,0,1,d36ac5cf3d10f56f8754a3059736174707253319e660e2eaecfa175551d93ee9,2024-06-28T14:13:32.650000 CVE-2021-30534,0,0,9d3757d88809b2bdfa5757e6ec274908b9799088941162e64c911bebc5dd8153,2023-11-07T03:33:05.043000 CVE-2021-30535,0,0,6f5f2df28482dab0c8d2853ad92f4d041cd0b9595c9bc35bf0c342cc3a40c659,2023-11-07T03:33:05.130000 CVE-2021-30536,0,0,4b3f305fb3711e97da4c503afd343b77a9f242436db7432abe7211f564724cb6,2023-11-07T03:33:05.333000 @@ -174903,7 +174903,7 @@ CVE-2021-30897,0,0,09f72ca057ebfec6ae009834d06ba3464f5e4e2492382f83c6a84ce10e7ad CVE-2021-30898,0,0,d65e967e7c8f99bdc99b2aa3fafacddbffc381760a96c71e7de86d141f373c25,2023-11-07T03:33:45.357000 CVE-2021-30899,0,0,86e8b41d8e563461b5e5f1af7eaf26a537d70030f865c3b51b4fb141aeeb3a9d,2023-11-07T03:33:45.633000 CVE-2021-3090,0,0,201b9e642b31a351e1608c4327f8b086908bc4aa94737d5694daa2196fc8f62a,2023-11-07T03:37:52.393000 -CVE-2021-30900,0,0,6388bf16e699d38b648178722167a3ac4c18f0a572402f6c8e146e53eba1bf1c,2023-11-07T03:33:45.910000 +CVE-2021-30900,0,1,fa9b1704da9a4a17f8c8a54c47656fba98e8f425686737d3f9d0f4c45e1108c4,2024-06-28T13:40:36.333000 CVE-2021-30901,0,0,8d9518fc28c1be670a9de0ca5dd0b9d0ae4f4d406be29ce59313881867c49dfa,2023-11-07T03:33:46.197000 CVE-2021-30902,0,0,d02e95660071d86bb5d7852e95a0445c117ca59bbdbc13243b200b3756477f31,2023-11-07T03:33:46.497000 CVE-2021-30903,0,0,663cea65d6811c32ecb8b3abd394fc47ec565c35d541b572e1a097d69c801734,2023-11-07T03:33:46.850000 @@ -174994,7 +174994,7 @@ CVE-2021-3098,0,0,79504d9178ac57d24d46e219b05b52d08c198f4617bdcf84a613fc8f2fa9d5 CVE-2021-30980,0,0,323b330fe631f19584a623614ad2059ac7fcaf99291688d07c8b849ceda95d42,2023-11-07T03:34:10.797000 CVE-2021-30981,0,0,3d770418913b2bd0f48a3e69b9f1ca03c068c789f3f547eaea72d75b0bd22740,2023-11-07T03:34:11.093000 CVE-2021-30982,0,0,b4c2e49d5c10d3a66412960da4453e461d64f2c3a4587bad3a9b3e86acc14438,2023-11-07T03:34:11.393000 -CVE-2021-30983,0,0,b4a5fa8d73fe6736dda9d631a49453e3a5a2cdd84be5d7f5769029e51f5c5778,2023-11-07T03:34:11.693000 +CVE-2021-30983,0,1,95392e5f24345c01e0432c0b78bfe0de859a11d5b7138b10b5577557ef8968f1,2024-06-28T14:13:38.343000 CVE-2021-30984,0,0,e4423a524307694fb0d782891904826f9e42693b9549f45823852c4a09269e06,2023-11-07T03:34:11.977000 CVE-2021-30985,0,0,1c28c65301581fe2baa124a46bd70d164c541cf9a02eff9dc7bbfa97e40b2e8c,2023-11-07T03:34:12.270000 CVE-2021-30986,0,0,86cc2e070465605c21b2175ed34de35ef1596d328aeaba18030cc49fdbeb0be0,2023-11-07T03:34:12.617000 @@ -175024,7 +175024,7 @@ CVE-2021-31007,0,0,6043c9550264680030e009f0e89e41122db305539a92f7b82be7201ccd09e CVE-2021-31008,0,0,48db9346fcecd45871eb34d77d4a516f738febe0620f3fe0cbac598abad6cc70,2023-11-07T03:34:19.163000 CVE-2021-31009,0,0,94f04ef2ccff4684615108c4415e025591c846c9eb7d8d559af1083a66fafc7f,2023-11-07T03:34:19.453000 CVE-2021-3101,0,0,2eaffcd22c0f3bc178d546b492c03197bc7cd31c90037a012cd7f08dd690fc88,2022-10-25T19:30:10.573000 -CVE-2021-31010,0,0,ecc98f02e24b3672a6da81d7fc731a5fe9a29e6b39f9e3ef6feaf61f8e400375,2023-11-07T03:34:19.760000 +CVE-2021-31010,0,1,78e173678bf3f4036eab25c87fad930e41712dc874bb4443f047c25f60d131c7,2024-06-28T14:07:36.563000 CVE-2021-31011,0,0,549cf0ed685ed45fd3ea422c5f28fde28a64c5f4e02106318c85e0b7ad40feaa,2023-11-07T03:34:20.100000 CVE-2021-31012,0,0,3d11a24ea55e0c313cfba88afd966a7d39f8e3219b7558d385a6e49603c3dead,2023-11-07T03:34:20.373000 CVE-2021-31013,0,0,4630aebf5c0b560b9d28b60e4585be2cc8695ed442e8214a9252903cd207ac17,2023-11-07T03:34:20.623000 @@ -180319,7 +180319,7 @@ CVE-2021-3816,0,0,523b4000b39d8b1474c0837b1bc359137a64189ff057ec40f42baf31e90f03 CVE-2021-38160,0,0,d0e081d5c29b4def1a4325c9f96182af3cee30f12a5e62c5e96900bf2786f529,2024-05-17T01:59:29.307000 CVE-2021-38161,0,0,3c9dab97a1f6a01959df49350a48550f936ab2850de2267dda471e4c7588362d,2022-10-25T15:30:25.020000 CVE-2021-38162,0,0,f36ae6e0e78688c9f1a2447dc5bb7d9777f5f50627b3a1b59b2f72157294ea89,2023-07-10T18:15:10.387000 -CVE-2021-38163,0,0,c368b49a153b59f599cd5d6a7fcfb32c7be035c0baa2d0ca853f4be8bf3e5658,2023-08-08T14:21:49.707000 +CVE-2021-38163,0,1,35bb994b2593f35cdff51ee6a670348a5203e05a395d0a30e2d39b88b8e9bea2,2024-06-28T14:14:53.897000 CVE-2021-38164,0,0,5619f13593c7cd27f024fbc4f21692a97bb8503e7482fa39000090ec3f6f9e3c,2021-09-24T15:54:03.783000 CVE-2021-38165,0,0,516db44284f0e47ded729e6919c9fadd1fccc341c504e2fb9218b742c74f1bf8,2023-11-07T03:37:22.627000 CVE-2021-38166,0,0,e55c6c827a12413232406a318c19c79f1baaa815caf88d2c94f56aeaebbef49f,2023-11-07T03:37:22.707000 @@ -181097,7 +181097,7 @@ CVE-2021-3914,0,0,6d83e291ae5e20d6400616590e0b1321067a479eb7a91a1c2f180554349387 CVE-2021-39140,0,0,4531b87a52ad4efef4d8d25b4e9946a1588d353a9baea76871437a3eb58a3108,2023-11-07T03:37:32.777000 CVE-2021-39141,0,0,e202d9d98bf9062fed5fec6a43fbc781542759641849dbb7b46be589112cd7d4,2023-11-07T03:37:32.907000 CVE-2021-39143,0,0,5a365bd525c7a725809dca08f7f55bb1f9952886821a7e1f65f046725c706941,2022-01-18T14:45:24.663000 -CVE-2021-39144,0,0,16544458a2c508c58f4bc08a5a7616321edb55cd9f6a17d59de99edde8ea19d7,2023-11-07T03:37:33.077000 +CVE-2021-39144,0,1,d5563db6ddd8dea58a82dc4021b1a97d077fd6eff0395e9824708f1fd2483174,2024-06-28T13:42:30.620000 CVE-2021-39145,0,0,ae47fd5bbed693865ab3b3e2041075530c1573771e35aa9d6c7500fb095eb13a,2023-11-07T03:37:33.233000 CVE-2021-39146,0,0,77e1a7a51256057d1d32785bec6bd3e343fec50d867cfd0cf9d8d39cf1c58244,2023-11-07T03:37:33.363000 CVE-2021-39147,0,0,8b6bbf801020f698fa564f3b03f65fac074bd0b5de9230d672f0a62fbd2daa9c,2023-11-07T03:37:33.490000 @@ -181186,7 +181186,7 @@ CVE-2021-39222,0,0,7192e32090be185e537f01509c9a44086fea6a5536fe6ab4b4839a283a13c CVE-2021-39223,0,0,764cf7c02f9d8b3213b37e4c87ffb0dd5f096f413ea6bc86c370e473d3943642,2021-10-29T14:43:56.177000 CVE-2021-39224,0,0,a08fa685225c16dc39c040e648a3aeaad9331b0baa9c4139dac5701707d1d777,2021-10-29T14:48:38.833000 CVE-2021-39225,0,0,0e80098bffdf0759c2cf970012a3c8174e7fa971774f5191e5152b6fe4eac6cf,2022-04-25T18:02:16.887000 -CVE-2021-39226,0,0,583081a50400d0d9222d37932a8aa3a62530ca1ee0d756073be429085d16e6cd,2023-11-07T03:37:36.990000 +CVE-2021-39226,0,1,4e85d583a89e0b6879a34028d8ae205a88f0a02ae812f5370455c14a91ceab9f,2024-06-28T14:05:43.580000 CVE-2021-39227,0,0,8390b52e7fbac31d810bbc9936743d207f00d94c13a31979c62c84b2275ca00c,2022-09-10T02:45:27.430000 CVE-2021-39228,0,0,eab396523fae95bb07a80919b4e9ecde8b142d828e94b1621c81e4118681c27a,2021-09-30T19:02:35.443000 CVE-2021-39229,0,0,8a9d408818dc173a0165e36babc6c7cb8d0abbb4e541456b286cadd2df6c3920,2021-10-04T18:47:23.623000 @@ -182082,7 +182082,7 @@ CVE-2021-40336,0,0,a7fbb04c56931dccb78e3ff3cf7a27f70e5e0099f036818e7d93780e47c30 CVE-2021-40337,0,0,b704b4e1b5aac795ed01a1b14c4d807a92a1b8189651a7c7330495beb0a72772,2022-01-31T20:44:02.860000 CVE-2021-40338,0,0,d292afffafaf14dfac146f88b681224f9e016696595e2c45103bb17838f91a50,2022-08-09T00:50:27.057000 CVE-2021-40339,0,0,28634d8726dc562bdaa9d22d077f49a0b97798ad88191383bcdb1343e3bf81b1,2022-02-03T17:33:22.717000 -CVE-2021-4034,0,0,e83169812fa53fad5c05f3b757f429a8a001e445cf8133f7f8cbdd626cc7eb4f,2023-11-07T03:40:06.873000 +CVE-2021-4034,0,1,49a81a94bb6e6ec6256967437b6062a00b98c1919a9c038de5199c68e83fced8,2024-06-28T14:14:04.403000 CVE-2021-40340,0,0,74813d0747388d523b091afc6fdc7a7d0ed75088a4ecb7e6ee1444f95a4e3586,2022-02-03T17:37:01.523000 CVE-2021-40341,0,0,9af85880d30b95c79a5da76d9d9d1ca036c1e98b9eb7e7344d9cb4119f397d76,2023-11-07T03:38:33.497000 CVE-2021-40342,0,0,dacde045abfb5a8f0acabb0e57ca604f3b0f4d391b1fb9e444f40fdd19a36598,2023-11-07T03:38:33.573000 @@ -190819,7 +190819,7 @@ CVE-2022-21583,0,0,e5e41dc02e1eaaf816c1ee7970deecf4527d537635514fccf92f7939d2983 CVE-2022-21584,0,0,546543b38e0ffde4a29127540cb5fcf45ed7ced42404d6b2676568b459eeeeb0,2022-07-26T15:21:35.487000 CVE-2022-21585,0,0,a3908a224d32a319b4f9f7e7e13baae9d03d8771fbb714c946b45a99f1729f18,2022-07-26T15:22:31.600000 CVE-2022-21586,0,0,fe2d243f2014c6d31d7c55a45edf1edf265c9f15087244f1c85764a493b4c156,2022-07-26T15:22:36.930000 -CVE-2022-21587,0,0,c9d3068d5a1a2f5e84185cdbdf6482fd4ad7ef1e24afe2a1989f327f372be033,2023-08-08T14:21:49.707000 +CVE-2022-21587,0,1,7d33c4974160e251004e29444365b58d6afb7fcb0de4c90c756a1efd2262726f,2024-06-28T13:44:41.740000 CVE-2022-21589,0,0,0809cff3de1b0f325a0691c467316a66ed1d10ca1e754f26b3e3b8adbeda95fe,2022-11-04T16:52:49.890000 CVE-2022-21590,0,0,d9c283ab1740c7f38f5a5ff5212c9b580ce9c5cf81b75dc19b866fb7834319fd,2022-10-20T16:54:32.470000 CVE-2022-21591,0,0,aca243436791ac3e23fa40acc95afeae890c995a41fe37d397e1f0fdaea0c8f5,2022-10-20T04:32:59.427000 @@ -191219,7 +191219,7 @@ CVE-2022-21968,0,0,52ae918588a26bffb8b41bb74bed0b3544bde640040647da5f8966945be54 CVE-2022-21969,0,0,ac3794d1a86de9132b791bbefa1d07df7d7c33ddf5816ee9aa3f668b9cde51c0,2023-12-21T01:15:28.663000 CVE-2022-2197,0,0,a0b558fe721ef36358173a8fe15a9e3c87f2281f3e94da67ccb32b5061c2f93b,2022-07-13T18:24:27.743000 CVE-2022-21970,0,0,b8451e6a9d41b0c2a5cbce9da22d8bb1ba99268c274ca68cd3f593165204bcdd,2023-12-21T01:15:28.763000 -CVE-2022-21971,0,0,044a14e8eed5944bce372bd760c3371055028e9ef2a01e2e5cfac75e5ba42f4b,2023-08-08T14:21:49.707000 +CVE-2022-21971,0,1,911e54f4788372cd93b3828f26c70564f047b78419dc7136da6c00866e4eae84,2024-06-28T14:12:22.867000 CVE-2022-21972,0,0,b856d981273e1b7a47e70c0d1ae844c7952ea29179c9c67a99525e46a22d2048,2023-12-21T00:15:09.640000 CVE-2022-21973,0,0,7a015b75ddfdfafd3267d6f5f566d896175fb6279b106faecf0a30dbe0edf590,2023-06-29T02:15:09.550000 CVE-2022-21974,0,0,ed8c59375dc5f9009802709db8a4bc61fedfd1dab743cafaea07d61009f7e232,2023-06-29T05:15:10.080000 @@ -191290,7 +191290,7 @@ CVE-2022-22041,0,0,2d56c93f61b492daddc14060ace51b7037ac1961f581675b86544d799b6d5 CVE-2022-22042,0,0,e79a16015f897613cd39fea5c74c1b78d1fe3eb47ef0895322f6e1b7465f6f33,2023-08-08T14:22:24.967000 CVE-2022-22043,0,0,f4843409fdd53329e94e5cb163d0434354eaec7c2a75197a100e41d542078b01,2023-08-08T14:21:49.707000 CVE-2022-22045,0,0,56b3d782cbe089c0d10183d4677e305d6602ca29d20e7e333be921706ac35a2a,2023-08-08T14:21:49.707000 -CVE-2022-22047,0,0,80777dbb018489cf480f48ba8eebcacec5823d4e52ffcf8b2007f9dfed739f2e,2023-08-08T14:21:49.707000 +CVE-2022-22047,0,1,a6d2daacf52cfb2564f39209ec36d1131b4602f44d6cbb9e0bb79599ef59ef3b,2024-06-28T14:13:17.207000 CVE-2022-22048,0,0,a1e7d4a048cec4839d01fe0f832a41bd272f1a13204318b7db2bf706249ffac2,2023-08-08T14:22:24.967000 CVE-2022-22049,0,0,d6bb14cd48797f8b6c5c10595446f0d95fdf37ee57ba31d01f3ee91b469f50a0,2023-05-17T17:15:12.677000 CVE-2022-22050,0,0,47639e3b1a87e85e5aa2328a532b0dd88738bf25795464a763943ad0d09e3c1e,2023-05-17T17:15:12.757000 @@ -191751,7 +191751,7 @@ CVE-2022-22532,0,0,7c406738ae5fca59bce07be25d88715e161f428d9243685307fe1294cdaa5 CVE-2022-22533,0,0,cad084a6e4948a412ec0077d0fab9d9bfe52710d787ca2914f6f7806d4a45f65,2022-10-27T01:09:21.460000 CVE-2022-22534,0,0,1b0e1a316e0a0c48061a2a8da43b28fdcbe313c3d27b787471867119d17500b1,2022-10-27T01:10:54.553000 CVE-2022-22535,0,0,67df1391c7a15e27ad8c94dc4400eb7dd33f0058b06b829ad26d1963bc7dc59f,2022-10-27T01:10:59.470000 -CVE-2022-22536,0,0,f6cf5507f362c986017fea9a3e8d0cefda39e1339da333252512fbf4e245e50d,2023-09-27T15:15:58.430000 +CVE-2022-22536,0,1,7f806b45850e8f0767e20711d8742e5d50ed022d8fb5f3244b12c9fbf3a543bb,2024-06-28T14:08:51.130000 CVE-2022-22537,0,0,a5f15a4dbb7ea5eae9a899ed56c5611b463eef2becf3a5f6aff68f908517aa38,2023-07-24T13:50:48.463000 CVE-2022-22538,0,0,93cd3cf695921690b770c71dc2939677ab20dffc0428559856053985d9dd1497,2022-10-26T15:23:20.867000 CVE-2022-22539,0,0,756fb202fb18f001c26220bac07a87e5b7a400991356dfdee7caf18522d943ed,2022-10-26T13:57:47.060000 @@ -192101,7 +192101,7 @@ CVE-2022-22935,0,0,7e6af285c62d45269a980ba63651cb532cba5e2bb25be8081ec1121557992 CVE-2022-22936,0,0,c442baf929ebe37be1a89f04bf24f2bb2e0131e5e3675dcd33768e4876d858d1,2023-12-21T18:47:15.553000 CVE-2022-22938,0,0,6f3d510ca7fd52f4dff498a5adc17435d1b14d6e54a1878e964427a42c141f22,2022-02-04T14:18:00.200000 CVE-2022-22939,0,0,d709837c1c997bf31f720d2d384dba45a81e8ece69d3b85a43c69335bc2d8796,2022-02-10T07:06:53.217000 -CVE-2022-2294,0,0,b14d82217917727a6bc46e6bc62995f66f1b145bac54f6e173e10523b9fca5db,2023-11-25T11:15:09.417000 +CVE-2022-2294,0,1,7eb3b57bf8ca34006512653533ff42160051b867ad558ee38551f9fb644cfcc4,2024-06-28T14:08:30.807000 CVE-2022-22941,0,0,b0d89121d1f22624816a6879231d8f74404bd7dd423070657f1c02c9ba6baf0f,2023-12-21T18:44:31.113000 CVE-2022-22942,0,0,4b1723bccfdbe2483a6b335340f90daa3bfd629cd0521bc6ecb5ae45592c2f1d,2023-12-18T17:27:31.137000 CVE-2022-22943,0,0,d8c2eeecf63c4c6da5ff7f0018a6581de55808e4033a8b159e6e33470320e562,2022-03-17T19:03:25.660000 @@ -192125,7 +192125,7 @@ CVE-2022-2296,0,0,6870ae78d50ea7a7e7d94429968fa45b904f23f3abd4f00dc1466477472382 CVE-2022-22960,0,0,d17d1b5da7f72154c32fd101294c275155098be3bbe92368e1610d0ee36d6dc5,2023-08-08T14:22:24.967000 CVE-2022-22961,0,0,67cee2228323ec37bd4118df1ed9664f1f85314d9e3f9380aee384580bba62b7,2023-08-08T14:22:24.967000 CVE-2022-22962,0,0,a42bb2362965967fd99bbf6e8b524012212d4e10e4942fa16c4bb2dd5d7a7cba,2022-07-30T02:38:21.937000 -CVE-2022-22963,0,0,229b9fed4f70862839225579ad5d044264412a55fa9bf6ab021ee2a87df3b64f,2023-07-13T23:15:09.393000 +CVE-2022-22963,0,1,ef70678e16701b53f66c30a72b13e3119cf96d6e7ae90a2a4c1a563fa934f4c1,2024-06-28T14:08:19.670000 CVE-2022-22964,0,0,586355df8e015aae9e480a5fdfb128e0c3456976b25c61bb38a5ef54c2886079,2022-07-30T02:37:01.003000 CVE-2022-22965,0,0,98126021b262e5fe3fe5ef8a13ea4d9caed92fb4cb15ac20f4b335c9a640cd5f,2023-02-09T02:07:02.263000 CVE-2022-22966,0,0,cec5916af60ebe09f31ad4ea5905a33148349eb8d2cc154f21e2aa1e855c9a38,2022-04-22T15:54:21.460000 @@ -193673,7 +193673,7 @@ CVE-2022-24701,0,0,8ce6a1c35042ada35e1c934a6a41ea3a9f72667d7ec4caaf8d65eb9344021 CVE-2022-24702,0,0,002bff0a00061e91fa3cbe633489055805ba07550c2d8dab6d0e326cc3370460,2024-06-10T19:15:52.243000 CVE-2022-24704,0,0,2769dbb7f2f45e7b73925cbd6160120124fb912e57f6692321d1ba296fe79e44,2022-02-19T04:16:51.300000 CVE-2022-24705,0,0,c02d893267e2c52ad1ddba5601d8c9c840929ec7886cb7bd1290049f56765a14,2022-02-19T04:16:28.110000 -CVE-2022-24706,0,0,1506995f2ea4afd9f209a34ca18d9ece3afac8afdab6670e525955677c51ba92,2023-11-07T03:44:33.733000 +CVE-2022-24706,0,1,b52d947b6abbea1dc632b67696faebc4ccd451564d782ef1367fe830932af0b9,2024-06-28T14:06:29.153000 CVE-2022-24707,0,0,1420d81bbce7155091fc769091f58f12612f19566d1bc5d0591913e2ef1b0784,2022-05-12T19:36:06.057000 CVE-2022-24708,0,0,8ee7c81c5dc04fe8f1cd750b46cac8e942a1d217e009f8db98891fcf846087b6,2022-03-04T17:43:37.957000 CVE-2022-24709,0,0,b3cde4497c2a60b55fc82abea5c36d09f7fbb87eae33e4ca17cc0482e3e88e23,2023-11-07T03:44:33.883000 @@ -193970,7 +193970,7 @@ CVE-2022-24986,0,0,2f7cf01b4fbb872ef5caa3b414de55a2146e5068d5a38e15f564a9f36f6b3 CVE-2022-24988,0,0,09423aff2b2ba8c6bc982c26b4c3a24f80b10975a619c551f1b684e664ad78e2,2023-08-08T14:21:49.707000 CVE-2022-24989,0,0,5b39dd94a2f61aef3793b734a99f17b9beeb88f0a03f7c4dc3181dca410c2a5e,2023-08-24T20:52:21.533000 CVE-2022-2499,0,0,74ab1b2d902098eff5f786137d45fad32a04e95e5c68957b0fa665fcb1746a19,2022-08-11T15:17:24.963000 -CVE-2022-24990,0,0,4b713d894ff57685fcda426043d4420d064bb9d879ad66d85d268ae18ddc3f1a,2023-08-08T14:21:49.707000 +CVE-2022-24990,0,1,620520f0825ea4998633c95c4bbe94b19603e1992376f607e8da8e5fe1f6206f,2024-06-28T13:44:20.137000 CVE-2022-24992,0,0,892bdcae0edd2e6eda4ce78891e0fef5989621afe97f80bea9bba454b66949f0,2022-10-27T11:57:26.493000 CVE-2022-24995,0,0,8963a7c169a3352fc3a11f487e4d0185ee670cf380c694e46306c71c0a112698,2022-03-16T19:32:31.323000 CVE-2022-24999,0,0,c323e232ab9c9d6975547e61f4aa96efa351c6f7066c91e4321512f1b724874b,2023-09-08T17:15:15.687000 @@ -194892,7 +194892,7 @@ CVE-2022-2613,0,0,2705769156bba6f27f784ac788bc68d117dccf546508708f0b6cf796aa7481 CVE-2022-26130,0,0,e3cfbac27b943eb46061ce2deac038d92c7f0bb2ed8b82045deb01a11bdc767d,2022-05-16T12:34:17.893000 CVE-2022-26131,0,0,e201a577539ce448fa5c37858b58af9176e209c969b7e93a64a87874412b5ef2,2022-03-23T18:37:02.983000 CVE-2022-26133,0,0,1254a4865f1cb6f473157f1a992ce268650a7fbe15ed6f624bbd28c1b0b8e829,2022-04-28T17:50:56.293000 -CVE-2022-26134,0,0,e81e836dc39d3e6dbb1b9b7be279e022f476ea1ad59f777cd3643d9c701051f0,2023-08-08T14:22:24.967000 +CVE-2022-26134,0,1,d3c92ffe05d5b347d66ad1f6e09fe61e264909d50ad2ff29e6820d2348a3d6ff,2024-06-28T14:22:46.883000 CVE-2022-26135,0,0,91a61893e29fde19f2b8fdc188578afe35a92ca0158e7d31c495c8ffadab9521,2022-08-04T15:31:35.393000 CVE-2022-26136,0,0,76b7fa1d1eb0ddd8706c5afcb45f5613e2c2b498a40010b0e706fa772917acd7,2022-08-04T15:50:26.633000 CVE-2022-26137,0,0,a5f950d03c7d289ffb0a16faa859ec35f2e06a8f2a3854f4cfbba8ad0d4bbb41,2022-08-04T15:45:16.780000 @@ -194966,7 +194966,7 @@ CVE-2022-26251,0,0,e66c25a8c2bb2910fff99516e91b2b370c7c3d2f407a4f9414453ef2ce3b0 CVE-2022-26252,0,0,c137d6f712f4a2ea28aa5229066757306c54d328fa9fdd05232008e4c1618fd5,2022-04-04T12:43:59.257000 CVE-2022-26254,0,0,62ed54e2353908d7a7f60531d90eb614f1bc7d302291081612812992f5015890,2022-04-05T14:12:16.727000 CVE-2022-26255,0,0,ddd3eaaf613fa7c66a2b694831c425b4901e9783cc2d38d7083b56e88915c4e9,2023-08-08T14:21:49.707000 -CVE-2022-26258,0,0,d29543a5d1da894e5d1b013157c1a82559d696126e685af45920cbe8792f7a87,2023-08-08T14:21:49.707000 +CVE-2022-26258,0,1,8b324244156e1e0fcaccdf1f4314a5b80a05989e8f8dc1e972ac7ce72882f0b4,2024-06-28T14:04:48.993000 CVE-2022-26259,0,0,82964ef8167286607d668df37e68dbd97384b77b6ab12a1b21a9ef943e4def3d,2022-04-04T20:40:46.657000 CVE-2022-2626,0,0,30a6b74ae4e34041a1a8589b0ebbdc7594f618d91d4cbfc09f9f0e024cd258cc,2022-08-08T17:41:36.517000 CVE-2022-26260,0,0,4c0332345c06fd34ce0354b08aada03d8326266b8c99f8f1ca9eab93a622e6cc,2022-03-28T20:12:04.870000 @@ -195534,9 +195534,9 @@ CVE-2022-26919,0,0,b6ee5b004b884b40b87d78738542bb2b03b861f128bc777dd3479a7c9db51 CVE-2022-2692,0,0,5637202d5c22b0969e718674819457fcd45e8929a6ab61e13ba30f2ef26f9e02,2022-08-11T14:03:05.543000 CVE-2022-26920,0,0,691ddc88cbe14d927810524b25290d21008f4bc2132d81c49c4bd32d6b23fb79,2023-06-29T01:15:48.537000 CVE-2022-26921,0,0,5ed414e709728924f06746c1685a9283132e96815abe7fc239760fc179b02537,2023-06-29T01:15:48.897000 -CVE-2022-26923,0,0,03884daa022ece234271f0b5245a043e8ea41e2a97cb636948c42171f0c10e5d,2023-12-21T00:15:12.770000 +CVE-2022-26923,0,1,78c18aaa2d206420312483bf6981c19e635e5617f23dfcc32697fd554e5979ce,2024-06-28T14:08:58.920000 CVE-2022-26924,0,0,c865244bacbd9e0f68be65c3302bcc5a3d5f3e3bccdab5895e69d3bc8a4c1192,2023-06-29T01:15:49.313000 -CVE-2022-26925,0,0,b05f50d1864258f32723699fc392a40d319978856ca1cf4da618ba936fb184c8,2023-12-21T00:15:12.883000 +CVE-2022-26925,0,1,221a1fb14cbc0507ff00774ce97219745cc9371fb2377fc82e389d8d8fb60ee1,2024-06-28T14:13:24.527000 CVE-2022-26926,0,0,e5ad1f78ba9545a592948fcbb2f1abaa4bd58dc199fa2ae6af1a9ef64bf0f567,2023-12-21T00:15:13.020000 CVE-2022-26927,0,0,a3384c5e46c4df71975e44e1bc68001feaf386cb5433d6fa6bf0c385cf8a7e6c,2023-12-21T00:15:13.133000 CVE-2022-26928,0,0,9c84d5555c8e5c42e2b530986cc0b0a611315e9bbcafbaace6f1677bb6875e1d,2023-04-11T21:15:10.467000 @@ -195969,7 +195969,7 @@ CVE-2022-27511,0,0,49604fba6f0fb6daf43c34472555e0a3973fa9fc2f89569461faf43924358 CVE-2022-27512,0,0,8c2f016969c7f9565aff662ab625fc5a51848ccf49888bb5cb268bf05168c96e,2022-06-16T22:01:24.140000 CVE-2022-27513,0,0,344ef15d193a69f64806725e15c3b048988ba7351eb4f0f5bd5ebd630bb85b9f,2023-10-18T18:15:08.757000 CVE-2022-27516,0,0,a73bb132655984d2f139aee25e197da8337c1bc2add8c94e1aafd92b73d2e7cd,2023-10-18T18:15:08.840000 -CVE-2022-27518,0,0,a468c17fc4e87547a0a2101b282330a3fc5e900a03b54b5d101fe03ace7673c4,2023-10-18T18:15:08.927000 +CVE-2022-27518,0,1,ccf794c46771f2d38f6492f7646dc2e39e4ea1d0bdc4ac9324d5a0d8f390efe8,2024-06-28T13:48:51.990000 CVE-2022-2752,0,0,7f0ddbb4990dc1ce2f4285ce49a973e9d2419e8a9401ac2b0024dc1695c715ea,2023-11-07T03:46:52.510000 CVE-2022-27523,0,0,a915ecea498a7c27056c8716b4ce26bdd7324fe4d09845266cd42ad4bdddaa61,2022-04-21T16:50:57.927000 CVE-2022-27524,0,0,df23d947ccb4805b05370cf94f0a346029620773facfe7524fb4a1cb4c087cbe,2022-04-21T16:54:43.887000 @@ -196772,7 +196772,7 @@ CVE-2022-28550,0,0,35acc23ce6a792e5e5b5aaac3eb04ef20f77b862a9fdd3d1d688e22d68c50 CVE-2022-28552,0,0,ce7412e2cbebcad23b6d5f8aee41f404093c0ef9456d5a64188a8b9a178a84d2,2022-05-12T14:22:46.940000 CVE-2022-28556,0,0,e6919561c53a29592bb473797040e71f76b6fc6a354b3e0728c53d29ab25e88f,2023-08-08T14:21:49.707000 CVE-2022-28557,0,0,14c37d4eb6faca376ae5724b2d225a206c86c764702a84399a7ba58e7d315068,2023-08-08T14:21:49.707000 -CVE-2022-2856,0,0,355aa465b78f4ab34edf913875b8e0f28030150e31c191ee618e815bfdebfa0e,2024-02-15T02:00:01.650000 +CVE-2022-2856,0,1,0f981b4648086d15039ed0e59bc2af356ea490e00ad4fbaf30b93bdc269eec6c,2024-06-28T14:12:35.147000 CVE-2022-28560,0,0,1281bdf707d5ebde484bec41497bd326577af9e0f24539beb33e7560d51103b4,2022-05-11T20:23:12.943000 CVE-2022-28561,0,0,30aec4d3bcb7a7b4315448f00aeb976a7e57c2c6ff373047940959f50fba2292,2022-05-09T19:12:30.380000 CVE-2022-28568,0,0,c727ea4350f3a22822ee6162ec6accb5336e24cdb2d788dda577511d06872071,2022-05-12T14:24:19.900000 @@ -198149,7 +198149,7 @@ CVE-2022-30187,0,0,f0ff7883dcf00091f55c54b87b85755549e178678c37d7ce31bd53128fd8e CVE-2022-30188,0,0,2941bd2c45742faafd16b23f558ebdfde99a7d2975a941b712b03621c3dd9af3,2023-12-20T22:15:26.827000 CVE-2022-30189,0,0,548a6acaaf218bf1730288a68ee096c480f043e6ac74a6e84d4b3e538f29a1b2,2023-12-20T22:15:26.993000 CVE-2022-3019,0,0,3bea80d94a486472e5b7f795c7e656e2b11b4a69c07fd8b874f0e8094b245a8e,2022-09-01T19:57:43.817000 -CVE-2022-30190,0,0,aa63e579fb3f6771875b640950383a483147a4588ade82edc64e61d4bab625d8,2024-05-28T21:15:32.903000 +CVE-2022-30190,0,1,6dede8ac97d09d4fe8e48cb9e5b9fd7930de0c083d839bc1e9148349c5c569e3,2024-06-28T14:14:37.327000 CVE-2022-30192,0,0,4c9d090e88b7c7c1d2333532b4cd55c47e3ec3617ef16cac102863cd48fe3af4,2023-12-20T22:15:27.443000 CVE-2022-30193,0,0,9950fce6b90f307eabf093ed766797e1ce725bf70e5e0be71e0d8d67ed2a6a16,2023-12-20T22:15:27.660000 CVE-2022-30194,0,0,6741568b8618aeba0e5903c41ab92e3a81559028136e4fe8383f33193cf6437d,2023-05-31T19:15:13.657000 @@ -198274,7 +198274,7 @@ CVE-2022-3033,0,0,04d6f731ac8bfa74ecd44970b9b4139094e5c3f9a2dccd741e7f3aaf386e97 CVE-2022-30330,0,0,876c82068abdcf186aa7b3e8a5f8616f863cc3d82cca821d376d16d4b07af7ee,2023-08-08T14:22:24.967000 CVE-2022-30331,0,0,b59f313d8f3ba3a246834807358e04b85d223642f4ad3f5d1588020d00fc8d4a,2024-05-17T02:09:04.580000 CVE-2022-30332,0,0,44a853d0f21cb54a3d6e8f1ab62da33b469752869a0e0ad135055671589c3583,2024-06-18T14:01:34.683000 -CVE-2022-30333,0,0,cff77551eb0bbaa9d935030139b5ed47ef9bba58afc5c97e359911b34416e453,2023-09-17T07:15:08.007000 +CVE-2022-30333,0,1,55300acd01befeaf7a91f569ccd8af135dbdc96ed4ccbe77000e577c74150005,2024-06-28T14:12:45.617000 CVE-2022-30334,0,0,cd25538698a372e38cded8a3faa0ddac856c8de83bfb793bc0c3db012023959f,2023-08-08T14:22:24.967000 CVE-2022-30335,0,0,f793ef292c40aa9629afac7f2d724bbe8c9406a4419beea8dad8af24e5cd174a,2022-05-17T19:15:34.883000 CVE-2022-30337,0,0,d772825c2fce5df3655507aff10ba744993fb9c7616951c01b12a1612fe8538a,2022-07-25T03:31:42 @@ -198298,7 +198298,7 @@ CVE-2022-30375,0,0,e332890859c56dcfe5a6b8701700d0e06d4a661dd4b04ab8582794681d383 CVE-2022-30376,0,0,2f15d0767febb438935bd574cb5691032de5b5860b997c4b39555abb4825ea92,2022-05-23T17:11:19.630000 CVE-2022-30378,0,0,c0b82b4e3286c616bf4771f0e6afe61660b7771be1e95a5db6c3146a5a53e67b,2022-05-23T17:11:01.687000 CVE-2022-30379,0,0,406a6b36b3be7d7e33d681ec295bce38da0c7073fc6b4a86196b523f835d3158,2022-05-23T17:09:03.923000 -CVE-2022-3038,0,0,6d73b4696b2927f4b528f5091cfe832f00eb544c9cc14e9c4d1bd6086d9fb3af,2024-02-15T02:00:01.650000 +CVE-2022-3038,0,1,54d98685165c164b1e7567bb632953856a05b4ce837a1ee7cee7a837d4780057,2024-06-28T13:40:50.297000 CVE-2022-30381,0,0,bcdd96ae4df6372bdae86d919c4b8843f6e880893a867237882b64198f43f345,2022-05-23T18:02:46.847000 CVE-2022-30384,0,0,5a4ed52707188c5a36e98b161cc45869d9528166765143596e0fa54aeb89b7bc,2022-05-23T18:04:10.067000 CVE-2022-30385,0,0,ad44945b47f058a58f9030d235daab30b9074079c5eeec09caa5cc8bd7d26887,2022-05-23T18:04:30.260000 @@ -198624,7 +198624,7 @@ CVE-2022-30746,0,0,d909b63169d5f04c03e8cdc11e5c6d2bf77c8764354d422fc2ef0b18d0b0a CVE-2022-30747,0,0,2adbde0b98ffe77a3cac66c9c93abb9940655b84e58de4fd7b3838fcf0d1bd50,2022-06-14T16:09:24.420000 CVE-2022-30748,0,0,f7a989283c0cc6ebdf17bc765d72505fd38b717cd7a1613d3fea1fe957739c02,2022-06-14T16:10:23.633000 CVE-2022-30749,0,0,989ae3bd9a0590701e8c2dcde1b744c9bffecc226b293beda475392230620e5f,2022-06-16T14:46:52.293000 -CVE-2022-3075,0,0,070d674975409e160a92289437c383c4d5e2d3b0578875b9adf518ddad5c276a,2024-02-15T02:00:01.650000 +CVE-2022-3075,0,1,606b91f142644e1c4789eb9ab2643f48da71d74b8dd6519813c944d87d31a39b,2024-06-28T14:05:18.150000 CVE-2022-30750,0,0,ab623289286d97b540e1c93fd394a47b6b0fbee558fb5cf25fcbb8cd3625b40f,2023-07-21T17:07:04.067000 CVE-2022-30751,0,0,319208d98e6d5345b7d02e568aca2d63d2e65e43bfdc012a20e94a57e438048e,2023-07-21T17:07:00.337000 CVE-2022-30752,0,0,632aff22322df3a00112187a86f2793b41e125e6c983ac38fe25155993dfb3e6,2023-07-21T17:07:42.753000 @@ -200444,7 +200444,7 @@ CVE-2022-32889,0,0,4c4854aa8b5f7d5d1776ad52307122d263da03b2649b41bdd92b9c94b5ed7 CVE-2022-32890,0,0,ae61af9783aa5e7012401806306a5a9cb32ae4b4a1c1d4bd767d26807284b483,2022-11-03T14:43:44.620000 CVE-2022-32891,0,0,e7bde66a13d2034f9099b5c9709579f5abce5fc7d6a5d98ac21acaec0fbb24b4,2023-05-30T06:15:20.753000 CVE-2022-32892,0,0,5e54946509b67350e2761b45e06111b0bd5ce9e8c5fab30f5dc100bd09b6f7eb,2023-01-09T16:41:59.350000 -CVE-2022-32893,0,0,161d6fd84dbdb4a87bb5e4ac023d648e449b6c5e4d831863311dfb7b40ce9d14,2023-11-07T03:48:15.340000 +CVE-2022-32893,0,1,d94366aeae31f2dc5d0a6f0c277dae91ad53f4a7936b122b0c8a85cb2b6b74a0,2024-06-28T14:09:26.977000 CVE-2022-32894,0,0,258579e09971ddea3b4815a13f4b228f09b463853438998782e99d4d4a74b2e8,2022-12-07T03:02:55.287000 CVE-2022-32895,0,0,a866a4ecd54090d59826e47060c2fe31da4fd60afa522dd3d88fdd6339a97c2f,2022-11-03T14:38:33.867000 CVE-2022-32896,0,0,17fd28355dac713cc35d13c78c58dc3e1c8b430c0015f022b283eda11acef2f1,2023-08-08T14:22:24.967000 @@ -201722,7 +201722,7 @@ CVE-2022-3471,0,0,83563e42d7088ab9e9883681b2f4f82e245a159c3eb603f07e17382b6280ad CVE-2022-34710,0,0,e845dafb5f57f8a026e6b5f2e9bf6c8c9104935b15fa731e05a4644912cf9372,2023-05-31T19:15:15.533000 CVE-2022-34711,0,0,48e4434d6069b53ed85e468c10ed0566b7a4867cd631d7410f1b9ee96c520596,2023-05-31T19:15:15.617000 CVE-2022-34712,0,0,65226952bc119e2f7313c70d4fb57234447e4e94b44c2e0953cacd3f8045658e,2023-05-31T19:15:15.710000 -CVE-2022-34713,0,0,1bc3b1efbeb3a4f12a560a846ca6756c7323f5deeffada6d6835eba509ff1d50,2023-05-31T19:15:15.797000 +CVE-2022-34713,0,1,99e8b711cdf5c203c4b6c4ff3acb2aa08da91c05480ae21cb0102e980a42c1a4,2024-06-28T14:13:04.940000 CVE-2022-34714,0,0,1c0a02d6378649d9c6f01fc84bc3a9b16b6bd0f66666f9f9385478ba70cc7a91,2023-05-31T19:15:15.880000 CVE-2022-34715,0,0,d5fa777e3c0d0d6f806da14bcbafd983f7b80aca6e3d0a0dbc1ba81732704f83,2023-05-31T19:15:15.957000 CVE-2022-34716,0,0,5863598ae50ca0cd63a13259c498cb06065b9197657ec91437623b4eedc3444b,2023-05-31T19:15:16.030000 @@ -203537,7 +203537,7 @@ CVE-2022-36800,0,0,14d01badbd2a41ce389af2a30917075d76939a8b9772445e553c81a61ecaa CVE-2022-36801,0,0,538074d1d855c030e3b7bb63787416ef746c3d1deeca37211db4131849af1de7,2022-08-12T17:38:37.907000 CVE-2022-36802,0,0,42e1a5bc2230c9e68b07cc6a0d64e3da7e5d8afb98b3c86183f3354cb1f726dc,2022-10-17T15:08:01.323000 CVE-2022-36803,0,0,aed777bac359e32e8375835ace269d6cbc5dac26e59cb16bd4548f49c530c7e9,2022-10-17T15:11:11.050000 -CVE-2022-36804,0,0,569822e645be3785e8fe63d892641dca422382d55590f4ed7958018ae479dd9b,2023-08-08T14:22:24.967000 +CVE-2022-36804,0,1,0ca1f04aaa3e26878886d510c1f32bf471ffd055bf07c2485f77648a7440ec06,2024-06-28T13:57:13.930000 CVE-2022-3681,0,0,9eb746de3b15e4b62afac1e708cc9560ce19a301b03a99d949295634cef63a2a,2023-11-07T19:41:49.927000 CVE-2022-36816,0,0,96167e602cbbd0a33cd989b05b4d893eaab6d690b163f851db49698febb10cf4,2023-11-09T05:15:09.047000 CVE-2022-3682,0,0,9f3e7c06f330db0c9487ae73467ab86182e7a11da48183f0fa219ca1fdfa4980,2023-11-07T03:51:38.277000 @@ -203886,7 +203886,7 @@ CVE-2022-37208,0,0,5b40ead7f2072f8ae0f09815c3cb55927ec98b0e86c3f75a09d9c87ec02a8 CVE-2022-37209,0,0,a81b69b0b03e0cea750cb8b6eedce7561f70c890fdcba755b5e5500c9983ed91,2022-09-29T17:11:26.660000 CVE-2022-3721,0,0,b0909060370f5b6a40e0b12c4abffc79788470881b226641404716ffceab7e52,2022-11-05T02:04:09.997000 CVE-2022-37223,0,0,deb2055262620cd463edde4b9ae76ed0b11e952d5b1936108b81e1994b59e4bc,2022-08-25T01:04:22.133000 -CVE-2022-3723,0,0,cc69a5963aa3c481b3268f1e5df7808c6466cec2db6a6d711a763a0ed870e29d,2023-05-03T12:16:26.557000 +CVE-2022-3723,0,1,4bcd52c4749c62446d2b67528c87691d6047bf5bb8a164aaff4deb0093a2110a,2024-06-28T13:50:42.990000 CVE-2022-37232,0,0,022f82c84df46a678b4b30231c94cb678ad95f04bda127320018ccda0a158d13,2022-09-24T02:00:14.660000 CVE-2022-37234,0,0,076f42fe22c0b9387ef14c1229cebebcbd7b0c5e9c97fdeaf190f64ee3914caa,2022-09-27T04:52:24.220000 CVE-2022-37235,0,0,8a0c73a5d77428f973dc5165ca7a4f9488d85e8afe71beb86815a2408c1fc844,2022-09-24T02:50:41.437000 @@ -204317,7 +204317,7 @@ CVE-2022-37965,0,0,c8ebd4b8d6da4c5db6f94b26cb967f6da8d1f8afa8fcf6e5cf9ba8b8d8524 CVE-2022-37966,0,0,2000e1e67ef1820ff11780588209b719fb0a239dd5d7926ad6215a6ea330e091,2023-09-17T09:15:11.040000 CVE-2022-37967,0,0,e762775b17812f1bfccb4cf00582df9dc5b3f3920a82acdbccce68d3e789cfde,2023-09-17T09:15:11.157000 CVE-2022-37968,0,0,634e23423651b4e285271ebed767c07e7a28b1d0701fcf02eaf1a7b034b8d98d,2024-05-29T14:15:13.743000 -CVE-2022-37969,0,0,31dd0f45bf1a3257376f02d882742aacd7bf565683b54a901f719d27a38d80fe,2023-08-08T14:21:49.707000 +CVE-2022-37969,0,1,4f14af3240274e12e290151edf0bb0d4e01c9a30a5f3c3bcd5d5b97cb68ffc06,2024-06-28T14:02:20.697000 CVE-2022-3797,0,0,2271201075f39d2bcce01ee31e15b75ae4442a49a419170fca649d511d6c668b,2022-11-02T16:36:34.167000 CVE-2022-37970,0,0,46f85e8717703f8c894bd98b8144a0d3f3b9c6c7a6bc5d862e59fb5f01f1d36a,2023-12-20T20:15:11.397000 CVE-2022-37971,0,0,d53441a8b77fb438ff31a65a2d14c39503d2028233289564dbf5e879a8823574,2023-12-20T20:15:11.473000 @@ -204529,7 +204529,7 @@ CVE-2022-38178,0,0,d8e5626a33ba17067d6c28207ca7858c230441d9aa90ad6d72677cccfdaff CVE-2022-38179,0,0,15f0bb3ddaded3184b4a693efc671bcd090f17fa5b43f61f35a7822aca13d851,2022-08-16T11:50:42.253000 CVE-2022-3818,0,0,86c57144b176edaf465c13a56ffb7e00e94b012eac96d101bc824fa8a183c843,2022-11-11T00:49:28.630000 CVE-2022-38180,0,0,2d61c19eebe84da871a6e6949f620e311e97291f40934430d60bfe25b287eeac,2022-08-16T12:50:38.767000 -CVE-2022-38181,0,0,9d58d62c7a5e53a0a3580958a80896f7ed5d6728d071d108af913fad20149615,2023-12-13T13:51:52.563000 +CVE-2022-38181,0,1,b8066a638da06a850ac61b09d556d0fb809a135d9739eea12caf0887756673d9,2024-06-28T13:41:11.583000 CVE-2022-38183,0,0,97aa508e024384f6ebc4005e745389942c467d10c4183d2547d965954927a869,2023-08-08T14:22:24.967000 CVE-2022-38184,0,0,ea76dd9c9935a302fe9b246600c1edb61b26280cd6b66a0f1209e87c8c599e2b,2023-06-27T20:01:50.113000 CVE-2022-38186,0,0,c38e3206c619a659f8d64b31bcd7b368e6f487d594ba680e5112cd355c5d68f1,2023-11-07T03:50:04.417000 @@ -206329,7 +206329,7 @@ CVE-2022-40680,0,0,b3307568bcf4750300ee9058ac74247c4d313f5c8424287dd408143cff77f CVE-2022-40681,0,0,be43ae10590cef18cfff9c508f390801e6d5cb2683fded41a81642b54db75843,2023-11-20T20:54:21.623000 CVE-2022-40682,0,0,aa67561d7b4bc1dcc305b8b631b53390e7622d77df86e6b8a0273d3932468491,2023-11-07T03:52:35.367000 CVE-2022-40683,0,0,183a7af16a041378e857e07c3be52c0eb2c849943d7b1980605605f64e2b7bb8,2023-11-07T03:52:35.493000 -CVE-2022-40684,0,0,171619e6a27ae359b634308e531841c15c1a45569b2602d7bdbb97eb7ae1765e,2023-08-08T14:22:24.967000 +CVE-2022-40684,0,1,8c4f60eb5b44b291e8af3bcd4adcf445be06be6048cf85ae4522e3ba0a112961,2024-06-28T13:57:03.760000 CVE-2022-40685,0,0,cdf6f8523bfee0aab84397f913ea3372e248bca6573dc5f1031f979b7d261b78,2023-11-07T03:52:35.637000 CVE-2022-40686,0,0,0131fe6847c9a34d605b5877537c17a5e468d854ed801a3687e4b49fe70d3c37,2022-11-21T01:45:42.210000 CVE-2022-40687,0,0,52421fa99672752a5d607610b148eb7b58cac44f66694c5d6b6b481c923c1682,2022-11-21T01:28:24.837000 @@ -206612,7 +206612,7 @@ CVE-2022-4103,0,0,e1d17074436a0b2b906d97ef098bd2e13a4f48a09a9559e0283d0db4073b9a CVE-2022-41030,0,0,2ed63a6922f679846d24b19b26bbd3ec0d1b6f96868e192ea22791d317edf45c,2023-02-06T17:29:15.637000 CVE-2022-41031,0,0,e802b23dead27f65ba5280d544dfe77df252caf44d9e0d281124aca501393d65,2023-12-20T20:15:17.710000 CVE-2022-41032,0,0,2ab0f015577c390d028fe1824c0f48b9f15a1847eb24f4eeb20560f8a3df49b2,2023-12-20T20:15:17.783000 -CVE-2022-41033,0,0,63a73b5636baf3ecd5bd999305c3e079b93770eeaa1c9aa9a30a6df1d6349db6,2023-12-20T20:15:17.880000 +CVE-2022-41033,0,1,dbea95cff8444ccc3649f02bfcf12ece7a6b18f37ee6ad7e8a379d21177497cd,2024-06-28T13:56:53.827000 CVE-2022-41034,0,0,a18542f36869e122cc47bd4b847d4a070ac2b8c5d3da4fae42f5ab9488d2bf3a,2023-12-20T20:15:17.973000 CVE-2022-41035,0,0,21517a1acda14d9bdb291f98cc699225709abafd869486ddd9ec49c6f9de2d07,2023-12-20T20:15:18.063000 CVE-2022-41036,0,0,3f3e9418030a496e5fcf19d455b2cf59443e13ad14302ef21962bc4b4e31b312,2023-12-20T20:15:18.157000 @@ -206620,14 +206620,14 @@ CVE-2022-41037,0,0,82da0b6c4380ed4325ceeec3b01eecf35356105c3518e60975ca6a13ed9c0 CVE-2022-41038,0,0,db78c67d25db495a53f4e57232af8c27358baf7102addcda48c1cbb9a4f1711a,2023-12-20T20:15:18.320000 CVE-2022-41039,0,0,1acb89c78b609890754c3f5f98affe5608a1c840c1a5b598dee449e936a884b6,2023-03-10T18:15:10.737000 CVE-2022-4104,0,0,a8e46fdfc7797583a19cacd22f1750174ef49469ba40facdb1cb9a6ac8d8a5ce,2022-12-01T23:00:50.490000 -CVE-2022-41040,0,0,22fd1291385bf88d311688d5edf835f074fc1e643c6f86fe153a50db1bf96d83,2023-12-20T20:15:18.393000 +CVE-2022-41040,0,1,578459c387907b265960565d95d06f6a46d5bb7e4f8e9d4dac4fea700cbfc696,2024-06-28T13:57:25.057000 CVE-2022-41042,0,0,45b84731ffd7aa132f31dec3488cec05a05f20d75c3f4b9eeddb3e44d654e99a,2023-12-20T20:15:18.497000 CVE-2022-41043,0,0,13244b3d0cafe0ffff651f1fe1139b169effb8705036067029aba1c38f99a3ef,2023-12-20T20:15:18.577000 CVE-2022-41044,0,0,eacb8e8cf3efd629193c65d14fe8ef93e5a27d35b64be538d61f2fe9fd388505,2023-03-10T18:15:10.847000 CVE-2022-41045,0,0,5ca0f1635083df63b97ef1926975b37c3fafe57ebd7b6ae8bb24d3e6cf901672,2023-03-10T18:15:10.943000 CVE-2022-41047,0,0,2acc341fefe010f47d503fc2fd924f329d519e0a041d9f6a7c3744fadf43089a,2023-03-10T18:15:11.037000 CVE-2022-41048,0,0,0420773a30e2c76b4f6c0e0a1931d6ee8c56879c55a7bb232ac8b541d66f21b3,2023-03-10T18:15:11.130000 -CVE-2022-41049,0,0,f7ae270471d6a8b5548a23618cd96fbb28f0045c89cc82e750e99c8850da8e9a,2023-08-08T14:21:49.707000 +CVE-2022-41049,0,1,4f1200c1bd383491b48fe8b457ecf38a344adf605c48e6ae7b48d8d659f6ce3e,2024-06-28T13:49:40.510000 CVE-2022-4105,0,0,1eb30c1001b92ca327ac842267c7fbf906243f1aa97aa7052988e9eef109bf45,2022-11-23T18:25:10.333000 CVE-2022-41050,0,0,79b059f685419238f4a9dd29d2677efdc0249c66c988d7b5803be996fee5d48e,2023-03-10T18:15:11.363000 CVE-2022-41051,0,0,3322deb89c47830c44b43e8445be8f92245e98561c538dedde0c092a7c992b38,2023-06-13T17:15:13.173000 @@ -206646,16 +206646,16 @@ CVE-2022-41063,0,0,7fd48990f96b989e31d99dfee06bf43e6965d9df36e0925e0b339fcbea219 CVE-2022-41064,0,0,b21aae3a4f35b8f3f3ee7227f9cd5a28f5997f57230f896fa5c29f10ba213790,2023-10-17T19:01:23.327000 CVE-2022-41066,0,0,e3966840324025002ec5fe93477fcbecda7484e70a3f43776968203c536ea013,2023-03-10T18:15:12.453000 CVE-2022-4107,0,0,d61b83c83a9f35305821bedc09057cc944f0079ffaf5a88d2c5cd1f58ff17c40,2023-11-07T03:56:56.623000 -CVE-2022-41073,0,0,015907c44bd5ae0915791a795c33469b18da772b7679208517e46690fa8276b2,2023-09-06T21:15:08.197000 +CVE-2022-41073,0,1,39335e4ca02296a7e4f4c38297a8e3d10910cca02cf844876a13043eb69aae5a,2024-06-28T13:49:53.320000 CVE-2022-41074,0,0,18a8cd3aa4ef9f8fbce44615923e5d2311735599209b09d898b1d0c7009b121d,2023-03-10T19:15:11.387000 CVE-2022-41076,0,0,97b4858033f4135864d17bf515fa740fe479d079fb31888662486ebf4e52c123,2023-11-17T17:40:10.763000 CVE-2022-41077,0,0,18a0772a9507af335a0c4408ce1a79c3fadec41699fcfb6e2de7ea9e54a5218f,2023-03-10T19:15:11.487000 CVE-2022-41078,0,0,108bf35932284d1a54d01e6314df2378f54735e1e7d0073f1bbf5c31b1a12d0e,2023-06-13T17:15:13.390000 CVE-2022-41079,0,0,4153234178d0c90231a2820519d680d1ce56b145004a290f8a90eaec121f92a5,2023-06-13T17:15:13.490000 CVE-2022-4108,0,0,aa1a10246da339e09f3c4540bef898ea95d8aad1ed3242eec22f90259ca08a25,2023-11-07T03:56:56.830000 -CVE-2022-41080,0,0,2343d3493f168272024522448fb3190fb7405070fee415215c9d852f1ebf9e07,2023-06-13T17:15:13.577000 +CVE-2022-41080,0,1,d28dd8789dd2e54e8f63f79aa31d9bd8e700074f066e3a6849ab05cf18427dda,2024-06-28T13:45:34.750000 CVE-2022-41081,0,0,001aa0f82ea1452301fc95e6bfb946fb93cf4ce4aaae955de5b21115d03de856,2023-12-20T20:15:18.650000 -CVE-2022-41082,0,0,5895359122af90e3a73a5e1945a069129cc7e2bdd5da5d2e57ccf5037acb3471,2023-12-20T20:15:18.737000 +CVE-2022-41082,0,1,12245727d7d6b9dad3f6b0bfc2d0a561bffbbbbb5379d76a752b53d1f6c64ffe,2024-06-28T14:00:52.743000 CVE-2022-41083,0,0,3ff90bc370e28ad4e3796ce6c0128a95416869f8b4972e912025e8cc8ee7bd2b,2023-12-20T20:15:18.927000 CVE-2022-41085,0,0,ab8d481339debb2cbdc02b26cc733ad57fef18cb7d8a77a1909f1e007893ec69,2023-06-13T22:15:09.167000 CVE-2022-41086,0,0,a02d8f0db75d0203339f552037cd5b53f9a81cf9efdb01f1374fbb86a5691a4c,2023-03-10T18:15:12.667000 @@ -206663,7 +206663,7 @@ CVE-2022-41088,0,0,7887a9071cdb551f4c83e8b0084d1d0c78434d58e4dfa8c19c269dff8d135 CVE-2022-41089,0,0,9f70ac5c9c5e9e132b9d007dc896fe5d26bae21520474524ae0a87e21d7a07ec,2023-11-17T17:39:58.597000 CVE-2022-4109,0,0,3943bd32484cb0aae93654f4d49c9bea041b6ab73dcce81ba9992e9c5b886624,2023-11-07T03:56:57.037000 CVE-2022-41090,0,0,fe6c2b46ecee4105c39a9fb8b59ad9a12d2d7227b814ca031ada15d53e7812c7,2023-03-10T18:15:12.867000 -CVE-2022-41091,0,0,bde42b99150614d12f6594c05ae590a029f3c8d3f8a9bc9683865f9c2808b5c0,2023-08-08T14:21:49.707000 +CVE-2022-41091,0,1,9c686254db09f40d6a49a62d09e603d1f16426e88cd7062216e9535725f21bf6,2024-06-28T13:50:02.067000 CVE-2022-41092,0,0,a2cee7e21dc791fbb5a2bb10242af19231db41cb1b5672eddb973dbbe79a2a51,2023-03-10T18:15:13.070000 CVE-2022-41093,0,0,a51a30da12dd6a568c8cfd1e79e96a917f5f49f286c6dc22503f32530b43ef2b,2023-03-10T18:15:13.173000 CVE-2022-41094,0,0,27ba939cb2210ee917cbcfda06ab069b5def1b2bf5260e54e72787c0ccab8b88,2023-03-10T19:15:11.620000 @@ -206694,9 +206694,9 @@ CVE-2022-41120,0,0,e71a425a2dfd86a3060739ea7f4bf24187de76bff50a76d53e545827dd149 CVE-2022-41121,0,0,58375e7fdad640431b1aedf84b46d8638b529b6910ad26fac0a9b80c53f36354,2023-11-17T17:37:42.320000 CVE-2022-41122,0,0,138021a921c473370ca49994cb600a37f1a44dcd1b5232127862043c7680262f,2023-03-10T18:15:16.177000 CVE-2022-41123,0,0,24c196107fc2902262a6809f960ddfdd75c200cdf3e575e95bc56ec83deba806,2023-06-13T17:15:13.950000 -CVE-2022-41125,0,0,ad2e7fc381a3dc160bb1c28bb590c63601d446630945275d99a8d2460a607b96,2023-08-08T14:21:49.707000 +CVE-2022-41125,0,1,6dd74ff9e525b639f31cb7bd203a426d6850deb15c99aff49ef662cb8c19c215,2024-06-28T13:50:11.033000 CVE-2022-41127,0,0,2f9ea12ef53449bf3a8c8df1ffa0b9e5dbbbf4576a5ae64a0565bd88898048a8,2023-03-10T19:15:11.913000 -CVE-2022-41128,0,0,f68a5ecf3c6616354220d6514c3a797958a7fc33874867f8935889730f419e70,2023-08-08T14:21:49.707000 +CVE-2022-41128,0,1,6fbd0bfe27fa5177c9da9076b4d6f8f8df07048e23da95bfd8a945c7bb2fba03,2024-06-28T13:50:22.857000 CVE-2022-41131,0,0,2a142de1c16cc0f0b88058f61e33b58ba15edce4dfc86afc785b37cd8c07e86a,2022-11-28T17:50:18.523000 CVE-2022-41132,0,0,8992dfa249511b3eb53ec82837d39bee1a611476e18b254631a045ef9ba4b79f,2022-11-22T00:36:15.677000 CVE-2022-41133,0,0,77759078052e512b90b1c84d1859e558099fb089407193166e2730ee56aee7f3,2022-10-28T18:35:35.807000 @@ -206889,7 +206889,7 @@ CVE-2022-41324,0,0,6e9b8ff41e00bfcc77b266b7a3b6163e7ad297cc9df1d8434f140af5ad563 CVE-2022-41325,0,0,076a23b6db4a8e9db26f3abe6a388c0d781ed95e952859c309eb34683ef6c4e3,2022-12-08T16:44:11.917000 CVE-2022-41326,0,0,abebff8816a3746c070f005ea5cc276c465f50d753463f79292b529430e95a1c,2023-08-08T14:21:49.707000 CVE-2022-41327,0,0,5550822a25edb1ef8f904091df8ce2ea514b508621c1976b3beb29e58288d9fd,2023-11-07T03:52:46.720000 -CVE-2022-41328,0,0,14d820303d4234ae3b6bd95dc2aad0d336ea91da28ef5f7d9f87defbc319ba26,2023-11-07T03:52:46.887000 +CVE-2022-41328,0,1,f7ea84f08a040ec3ab6eb4b76f4ad1834f34428209eea88dc994f9d7f185a934,2024-06-28T13:41:47.953000 CVE-2022-41329,0,0,0b9331811f1d2934167e6bec5bf05de50720593e61d8b8c2d9afc678c88a2273,2023-11-07T03:52:47.013000 CVE-2022-4133,0,0,7d3c603091de4472bd9fa2030ab3eefb3837bf19649c3a0e78e4a4b77433e11f,2023-11-07T03:57:01.190000 CVE-2022-41330,0,0,95c419f10340833c15f7abfab3409c2ec646f3a0261a96a40913e699a2ac3aa2,2023-11-07T03:52:47.227000 @@ -206906,7 +206906,7 @@ CVE-2022-41343,0,0,928b9df5210428f5ec7fd2d3800d947ce2bc99c6705e0799bcb5f0e5b75fc CVE-2022-41347,0,0,75055bde71e30fac253ec875c809f169eda252c607af054a21e7ddeafb2b5250,2022-09-28T17:04:56.527000 CVE-2022-41348,0,0,1be2d332db11d57b7b56a84a338f2328f071d617e13de979e7d350e2391bb112,2022-10-13T20:42:54.507000 CVE-2022-41349,0,0,71790a5fdbe73b30837d32fe237a2e491b9bb9e062746ccdd011180f413f82ae,2022-10-13T20:42:40.430000 -CVE-2022-4135,0,0,4c38ff26c1c331c8edf52144ff52cd5b32616b18e628d8d419cbf56954295d0c,2024-02-15T02:00:01.650000 +CVE-2022-4135,0,1,2721eb9116a1716bfb04b4e682b7a4d6118fdae4b57c3451229077707ff75d6c,2024-06-28T13:49:20.760000 CVE-2022-41350,0,0,5beca92fd9bd61d9e6c734ba620208b25ee4e9e7771f843ba7fc8e7c6f227599,2022-10-14T09:17:19.430000 CVE-2022-41351,0,0,6a5e8a7e404da772c3430bd70f77c02e852c9709d0ea3da33079a7d54fea0fb3,2022-10-14T09:15:55.640000 CVE-2022-41352,0,0,cdf4e979a61a007a3ba7f0320f79fcdb3ffbce99c12d1d5ac4b986bf353f685c,2024-02-01T01:06:56.070000 @@ -207857,7 +207857,7 @@ CVE-2022-42471,0,0,c73ff1cc9de14430e457f202154ff5ef453a45175c6cf23e1b47d3bba326d CVE-2022-42472,0,0,84ab333033ba6c4df613eece83c890107944d092fb6479c2cc8c4c24730b582d,2023-11-07T03:53:22.160000 CVE-2022-42473,0,0,4196048e7d13f02af76548f98f83b93116fd84f212d3724508c10a1f9d4e8ffb,2022-11-03T18:25:09.027000 CVE-2022-42474,0,0,5a7f46958ed3ed5b343481161f54a8f30fb5c046bdd2a95036b3920d1a7d6a47,2023-11-07T03:53:22.440000 -CVE-2022-42475,0,0,e4ddfd7833ef703bbe6e56b828ae4b85992bdfa829fc278e1a600d657816476a,2023-11-07T03:53:22.660000 +CVE-2022-42475,0,1,ae0ff5213d5bdf85ed9577193ea002736afb44f65e69ad8d0df99d90dafb5d54,2024-06-28T13:48:44.240000 CVE-2022-42476,0,0,a659960561475fc421710009d7ae0085580e4b1bd8f2fb144c8df1447580ab31,2023-11-07T03:53:22.927000 CVE-2022-42477,0,0,49c5fda760cdb0511e41c6e0315fadabac71058d2d7646adb9b00cedae1a3292,2023-11-07T03:53:23.190000 CVE-2022-42478,0,0,cc7ea5ce654747703b6eef0cd0cef8d804fe8b7f4aec256f40fcb58b23ccc17a,2023-11-07T03:53:23.420000 @@ -208096,7 +208096,7 @@ CVE-2022-42852,0,0,241c5697d8a3484eaa312a012f8f6ef3a984d8e979ca10ac0e1798a8461d7 CVE-2022-42853,0,0,268f67e39568cfccee94a33bdf46e7101d99b01502a05b022cdb6307ad1c24dd,2023-05-12T09:15:09.530000 CVE-2022-42854,0,0,68289039d27849d2cf74ad06c748abda0aaa9ff4ba7f8052f9c6652fcc17f792,2023-01-09T16:57:05.410000 CVE-2022-42855,0,0,241ae2acba25256adadf529d074a51d943caeb52f5641198caf0727238664153,2023-06-06T23:15:08.950000 -CVE-2022-42856,0,0,b7f10ebf5e0dccc8b57dba5d5a22d2ec5be67866a7ebd7e4931c5b3477e4a2e0,2023-05-30T06:15:29.513000 +CVE-2022-42856,0,1,cb6b8b321ee5f6e0a074b8ce0bcfd2752c761555b2150dc443f9cdd962bbbc85,2024-06-28T13:48:32.387000 CVE-2022-42857,0,0,eb78345b88fe99b52b3b485fb842e726f84d3cc4a2f8e58aa00f09d64199fc2f,2023-11-07T03:53:39.147000 CVE-2022-42858,0,0,84469c873deeaf0819561ff98d918f44a702e86ed7db0139ad10843c3f368491,2023-04-14T00:49:01.310000 CVE-2022-42859,0,0,ba07a7431a0a6c1bcee09db34a09cccab22b7bf914367a9fd2de5995b0e64722,2023-11-07T03:53:39.450000 @@ -209436,7 +209436,7 @@ CVE-2022-44694,0,0,2467760ef2162d18270a265e3804e10a5226e2e9e2fb1dfb9e0022618069a CVE-2022-44695,0,0,2dfcd25834455a413374835345592667870527ecc0ab2dbbc383c96c674798d4,2023-03-10T19:15:17.660000 CVE-2022-44696,0,0,5cbe7218e4458f9440a47f9826499303a018bfbdf6c89ff4d4e825f1b26fddfc,2023-03-10T19:15:17.890000 CVE-2022-44697,0,0,2364149262ac4c27057ebfaed4aacac741389cf500394009f83c283db3632b10,2023-03-10T19:15:18.167000 -CVE-2022-44698,0,0,af1a9958da1880f46747c910f4931bb241f0cad7a8a03c59227694f50dca548f,2023-08-08T14:22:24.967000 +CVE-2022-44698,0,1,e98fe3850eef0afa6e0b9e9b798740abd630806534de0d61f0f91308910fc912,2024-06-28T13:49:07.303000 CVE-2022-44699,0,0,4c35b2fc404cdf5e454ad56f55ff16785b282f9a95be07caeba19d361271d06d,2023-08-08T14:21:49.707000 CVE-2022-4470,0,0,f1c2167dd95201a6478b4e40a71569b002c08c21fed2772242f2f77cff781df7,2023-11-07T03:57:54.543000 CVE-2022-44702,0,0,4ef090e90ef6e9f4c431bae83029d0bfa75ffb454a9ffb740c11e8f05466482c,2023-11-17T17:36:16.960000 @@ -209534,7 +209534,7 @@ CVE-2022-4487,0,0,e7940af88873b2c8dd73930fbbbdc2f9504846dd3403abbe08bdd52d45a2d6 CVE-2022-44870,0,0,2312866ebdb9bacd49afd0be86ea06f17ae51f540b688d79c3a6c01fadb02369,2023-01-11T20:38:47.983000 CVE-2022-44874,0,0,ffd1b0e7225cb58be990c67f4034c775be6487a77435f073b04b0e20e88a76d4,2022-12-16T17:11:32.807000 CVE-2022-44875,0,0,3965ff9f187aa5576ab2a438b4a95d813f548a5cefadaaca94878cbcd7cc3ef8,2023-06-26T16:18:00.480000 -CVE-2022-44877,0,0,7baaff57665a210bf8584098cabd7420dc2d62bcb24cc3e2b0de2fa2fd2a1526,2023-04-06T17:15:09.703000 +CVE-2022-44877,0,1,7194164f20500cb0aaebde24e7f6a7ad6f71918d583c61d1a9e6762d74ad6e29,2024-06-28T13:45:26.473000 CVE-2022-4488,0,0,3aaa34d61053973c1ab03daabe6ae715078dd16fbeea042de3c3fca8fc42c78b,2023-11-07T03:57:58.717000 CVE-2022-4489,0,0,97550846a95721c1a9141a778239cb7256c8d1160b061f992394127b78513abb,2023-11-07T03:57:58.930000 CVE-2022-44897,0,0,1f410f0e2539ae14ff6a29737d61bef6d1f66fa2f29e809d35f24cf940b09039,2023-02-07T15:49:35.867000 @@ -210367,7 +210367,7 @@ CVE-2022-46165,0,0,ee8d2525aefce08e5030278543d0319a2c99933416f9e40ca105a63145ca3 CVE-2022-46166,0,0,8fc550751508b56e4421e64857f5a627ea04f2ae4a4264336b57bc0f22919272,2023-11-07T03:55:03.810000 CVE-2022-46167,0,0,297e579ff38394c5dd0fe56861a07d0d4e13501d6fcf55af592c5660d9b3f239,2023-11-07T03:55:04.020000 CVE-2022-46168,0,0,f62bd874b058c9a105df121807ba803d23f1a92ec2b221761cc2d17d60fd2df7,2023-01-12T03:05:11.650000 -CVE-2022-46169,0,0,1253f70396f514ddbe5aa9eaf0debdf4a6fb64c7ff3b1832486d4f977c8e89f3,2023-11-07T03:55:04.360000 +CVE-2022-46169,0,1,d10a5c8adb30bf930feed57ae98e32e0280bfcce0c0cecacbb23d915b04c80a5,2024-06-28T13:43:32.350000 CVE-2022-4617,0,0,bc289a06bf580be78e6e4029c01b21510f66920db051ec7c3e82008fd2322358,2022-12-24T20:40:07.373000 CVE-2022-46170,0,0,d0573daaa7a48ec663e39153efffb1df392c70ba9a203694678613668c3fbd96,2023-11-07T03:55:04.657000 CVE-2022-46171,0,0,2080bcffa29fafa2e4dd5d4311b1491a21a8356b1f599d486f1b66bf742ead74,2023-01-04T21:14:18.730000 @@ -211572,7 +211572,7 @@ CVE-2022-47951,0,0,fd892d0564e829be8c96d0585f45a8787d00812b15f72205e91250a3a57e8 CVE-2022-47952,0,0,e0e68211b555180bceaae5ebb869bbae1bac03bb415b3e4ca4e393c511a29813,2023-08-21T23:15:08.937000 CVE-2022-4796,0,0,84c6ccfc738362d7712f0b26fb49a54531716c01efb22d81a6cae626299f5244,2023-01-05T21:33:06.040000 CVE-2022-47965,0,0,129d0be4592e91bf63819c8bbadd39c5338c2a86891a624f39c62a45d5a3804b,2024-01-17T17:51:14.667000 -CVE-2022-47966,0,0,f7ee5e975a627b4aaaef565975a7c864bca06929f8826d274d5ce6a8167e8ff8,2023-09-11T20:15:07.817000 +CVE-2022-47966,0,1,b674263f12c5c92ada738b56711483f4dae1dadca3acedb285183833e97c10e5,2024-06-28T13:45:13.313000 CVE-2022-47967,0,0,6b7365c5419799f7cd31b6796edf99277ea7bfd43e65382a5778a00a1030aea8,2023-06-22T20:40:33.480000 CVE-2022-47968,0,0,d86323df240d630e7d6f7761d2f49e21ca94b7f9470b8721a8a962bcde90b3f6,2023-01-05T20:33:51.827000 CVE-2022-4797,0,0,f5bc98fc57113397ea76edebb707ec8972d15d9c220b63ddd8dc0e8d75cf2933,2023-01-05T21:34:16.960000 @@ -212276,7 +212276,7 @@ CVE-2022-4964,0,0,1e33f52f21e6461cc018675c2148aa96cac948ebdf6307b4d3746f8773a9bf CVE-2022-4965,0,0,db99caae0cb2de43133818216d728b6e383517fb71f67f622369387ae341b961,2024-04-10T13:24:00.070000 CVE-2022-4966,0,0,4b6a071e73471757fc55bd168cdc3f57ac339cd73c0d56a405fd8ea19bcfc79e,2024-05-17T02:17:05.713000 CVE-2022-4967,0,0,02b791d0d89835928c50c0454106b0e76d4d19ceb40baad75a3c2d84bf860088,2024-06-14T13:15:49.633000 -CVE-2022-4968,0,1,2df5f9b0a25bdf376cc258a933cbdd62208000d6a792dbe78a5d851ea2b1a140,2024-06-27T22:15:10.033000 +CVE-2022-4968,0,0,2df5f9b0a25bdf376cc258a933cbdd62208000d6a792dbe78a5d851ea2b1a140,2024-06-27T22:15:10.033000 CVE-2022-4969,0,0,e7667ad9e831fd9b2022455eeca9e7c590310d1520e21bc7482689ef0e3d9055,2024-06-06T16:15:10.250000 CVE-2023-0001,0,0,6ba5d6c17cbd7ec9fa4676d0367d715dae6604f51d9cfe28b728a892d018af19,2024-01-12T22:10:50.817000 CVE-2023-0002,0,0,1b2ceaca2ad4aa0f50a972375612dbbc2aec389d54ffce2da41cd327ee68ab86,2023-11-07T03:59:26.433000 @@ -212919,7 +212919,7 @@ CVE-2023-0665,0,0,21a1e442d510b9021a8f79d03b7be7b671eb54b756c782d3f8ac7583f4e124 CVE-2023-0666,0,0,a04ed16e278fde511d0a29bbf77bce03aeddc3c95778aa03f17c235378a9f663,2023-10-20T20:53:33.607000 CVE-2023-0667,0,0,2a977f40354da42a5f498f4b55e6a5c47c9f44e786e493d70ffb298649b989a6,2023-10-20T20:55:29.700000 CVE-2023-0668,0,0,5dedd25dcde1c2ba987536f105583d6bcdc9b6d517035cb67c81f9308bf141d3,2023-10-20T20:56:32.827000 -CVE-2023-0669,0,0,4a77833fddb2ab80c56da16c3347ba786c124746e39a67185d746af6bbe00f06,2023-04-10T20:15:08.170000 +CVE-2023-0669,0,1,25c3c6033be82e7bec8f316c7c0c5da7fa7777ae34dca1082b3d6d325a6b5278,2024-06-28T13:44:07.773000 CVE-2023-0670,0,0,8375655926fc6175cbf030b3ce2d123bc94d6c3bd17e57e9fc4d251bb5207ca9,2023-04-12T01:26:16.017000 CVE-2023-0671,0,0,74c71b509940f339a8626af9b8190c5e2e6ba6f78965dddfc3e95f00e541738d,2023-02-10T13:56:39.970000 CVE-2023-0673,0,0,208ccf12ee25f42079547279cc611be4145b62b16d5c6f6b30fe2c1be8a385f4,2024-05-17T02:17:29.310000 @@ -215622,7 +215622,7 @@ CVE-2023-21670,0,0,bf436e4ce6cf14fd6fd0e887f1819f39c53d142a8309017533410800bbb83 CVE-2023-21671,0,0,0c4646bccad01c7867e2d34b8cdcc301123e42092e194344b8480bc2be703102,2024-04-12T17:16:52.133000 CVE-2023-21672,0,0,cb227ba9140a53adff1acb3222d6b5f3bfefb1b3bc1faa1898cd6466f2a21c6a,2024-04-12T17:16:52.340000 CVE-2023-21673,0,0,7efb09e79544ca57879e3dfc3f72096dc44d11352624123ed711a02d25841273,2024-04-12T17:16:52.480000 -CVE-2023-21674,0,0,0d6386b3fb4a7d1c136527950238791f639788c9bb8ad26134f41cf475092f08,2024-05-29T03:15:18.597000 +CVE-2023-21674,0,1,388bb43ff40e459996fc265a115778b2a396f1b7d0d93071dcd0b3178c76a9d9,2024-06-28T13:45:47.150000 CVE-2023-21675,0,0,0c5de80905a6af9ba1743969ab5e0af401266fe3156ede205cbb0d4d34cce9e2,2024-05-29T03:15:18.717000 CVE-2023-21676,0,0,4bcd4fd58a0965545ca4a5d7a3f3ae15c1719886e64dc9e87f7e56c762f85671,2023-04-27T19:15:12.937000 CVE-2023-21677,0,0,1cc2de833f335cd63fd9fa5865bfa8a5206ed40f1b40994ef9f1d2a93fb62c02,2024-05-29T03:15:18.890000 @@ -216775,7 +216775,7 @@ CVE-2023-22949,0,0,1bf20823f8f7072deac4ccce20dc33ea8e1469d9d18b8a25751695bc9ca0b CVE-2023-2295,0,0,61144aec215fd19411d6752c134f90af281d2e503cb63823cabe245af19306ce,2023-05-25T17:35:57.487000 CVE-2023-22950,0,0,5658ac3fabbc957bb5d0a2f7d143e0958c70d0455a84560fabb6c081972c0f6e,2023-05-04T13:31:57.710000 CVE-2023-22951,0,0,90f58eb0b5828741e34aa5cd6469d7d7c29896dcd9e499b26420268df05fd963,2023-04-24T14:43:57.963000 -CVE-2023-22952,0,0,588da26e25d6aee0e8210c70bcf9c1159feeba065c315e14b9b5694cc2889e59,2023-03-10T17:15:10.067000 +CVE-2023-22952,0,1,b538283144661011c51864556875c7b8f0fea8807d0d6d458e7703d123e897fc,2024-06-28T13:44:28.923000 CVE-2023-22953,0,0,12205331f881c31f789bd0c77d8fd078e940e501483530dbdb4e697271642c1e,2023-03-03T13:15:10.930000 CVE-2023-22955,0,0,c3d292e0ad33931ad8804db706f4a57d1d8620ea233577d45015bcb8f0d29e7b,2023-08-22T17:09:40.927000 CVE-2023-22956,0,0,ef117983c3d562f01bb5ac814d351b3b0007164f943028a0ee2753e7ec2083f4,2023-08-22T17:09:33.733000 @@ -217103,7 +217103,7 @@ CVE-2023-23525,0,0,aca67744d919545a13f471c17fdfc51ad10220024f64c88d2659953c321d2 CVE-2023-23526,0,0,3a9849ad72fe95c41d7f587b8e19c976fcd6a818cb184c06cd31f722cae24581,2023-07-27T04:15:15.160000 CVE-2023-23527,0,0,fbf9e0cf4fc0784dae24eb8c4fefa878ec0dcaebcc77c92d09ab92222ca31c30,2023-07-27T04:15:15.240000 CVE-2023-23528,0,0,cd29be68d2cb22f0c38d70767b683c8486fedc09d9ab828a1443379b2641a1ba,2023-07-27T04:15:15.330000 -CVE-2023-23529,0,0,4b391d767ce41e42d09c004e0d1a7d48c6ebede8e64be27271bd4c013891f64d,2023-07-27T04:15:15.413000 +CVE-2023-23529,0,1,ff84d8ae1ee88a8562dd7c7848565dfe777fee30cf25bcf46f995b9a543c893e,2024-06-28T13:43:51.860000 CVE-2023-2353,0,0,1ae63af9ad41a5a7231e877b1c870cee660fc7d0585169d44cfd58e969945861,2023-11-07T04:12:26.477000 CVE-2023-23530,0,0,d3b858da0c2595191aa6aa915a8be4c17e9dad598067ddba22233a82bf7d6da8,2023-07-27T04:15:15.507000 CVE-2023-23531,0,0,56ae7488215fe94b3f96db5899b963c48d84436dc8c39b43812cf6fe8b7dbd8f,2023-07-27T04:15:15.590000 @@ -218212,7 +218212,7 @@ CVE-2023-24872,0,0,22d71fd72ff374cd5e6359fda8e717b8caaa5b5dcd67aabecc0f863e3ec27 CVE-2023-24876,0,0,0093725ff683438650b36d0f68c2d560d78a87cb7d63fe381f64df4606f58cb7,2024-05-29T04:15:34.013000 CVE-2023-24879,0,0,d7afa121f4816ee88aa4c9c8515f5f8879252d29caf9ab1d8f04635f35e253be,2023-03-21T18:02:30.157000 CVE-2023-2488,0,0,21b7c3bc26e0d7ce14344b58ebe32f508220979c38044a5446678aaf19ae1b49,2023-11-07T04:12:45.553000 -CVE-2023-24880,0,0,68224fc1b7996d01b79d647cff855c8ec79f64924f65e853479ecdadbed2e916,2024-05-29T04:15:34.813000 +CVE-2023-24880,0,1,f8bf0c0140e4635cf0f54a94833abd2efdb1d8271982651aaac642899d80df73,2024-06-28T13:42:03.037000 CVE-2023-24881,0,0,184b1ce772c2242127fa7143670af7242fcbd391879566adb003a4c1e195a7a8,2024-05-29T02:15:17.323000 CVE-2023-24882,0,0,904410be7ec6932a094e58f1366ff92bb808d0c82d7fd00e91fbdf4403044be0,2023-03-21T15:51:41.623000 CVE-2023-24883,0,0,cea7b843090ee414f140ec4e5a7bfefcad4170f24122ab7d1859df3d421434a7,2024-05-29T02:15:17.450000 @@ -219453,7 +219453,7 @@ CVE-2023-26356,0,0,8e19feb566901a10868ada6beb4d2dd9a6f2a7d0a5310fe6704d7e68eb05d CVE-2023-26358,0,0,53e139049e3fe73bd66b65b77295d23a6c43ce1a566d982daad63676a4ed49b4,2023-03-24T02:27:48.113000 CVE-2023-26359,0,0,006bcbd0e316f85df7da0aef42cbb357ea738fa6ed7d141e18ec164b14ea15d6,2023-03-28T13:00:18.403000 CVE-2023-2636,0,0,2d4255ff4524a98784642217dc6179e5822a5250a3fc7cbda3e9ba802ebcfad6,2023-11-07T04:13:00.023000 -CVE-2023-26360,0,0,039b867d0ba594d5e8801cdf436f8e0c8008c955363af6696b9dba125dd45e62,2023-05-01T18:15:49.787000 +CVE-2023-26360,0,1,68479e1597306f41f7a674a91a47b79abf75211fa5f4f94261f316d09ffe9308,2024-06-28T13:41:32.437000 CVE-2023-26361,0,0,12c24cc298763b507676aeaaf9b47907dd7557c6442611e84e3c9dadac7f01fc,2023-03-28T13:02:06.650000 CVE-2023-26364,0,0,7037e3bfb091d31bb04aae2b182e3b103e3757432d3a9778847c104305290ad2,2023-11-24T19:28:52.777000 CVE-2023-26366,0,0,2d409fa354646f6deed8a8760f53a365cf714cb84c3a4e029b141fb6bbafcf9e,2023-10-14T02:22:03 @@ -220393,7 +220393,7 @@ CVE-2023-27632,0,0,72e7e9925d098df2de82642a3c2bfee4aa8f3278e28c56d0e4a17757caddb CVE-2023-27633,0,0,8e4b74b4184edb608abc6ee4f458b5e4e307fc065abb72f930b14fb3e3c81cb3,2023-11-30T19:19:27.577000 CVE-2023-27634,0,0,9ee8fd113b6062c33121fe5260b8d446ee36032dfd38e8c4a69ce557c38d8e84,2023-06-22T16:20:13.857000 CVE-2023-27635,0,0,f9de5ed0d38d73d3be76457559eb4126ab9edb025cecb276aec1304acf0ece35,2023-03-13T16:40:51.640000 -CVE-2023-27636,0,0,1532d95d2ad0f28355e8cb205941afa8c619f65be3fe4be5c4883bb06ff59e8c,2024-06-17T12:42:04.623000 +CVE-2023-27636,0,1,3654236992252d30e98e7611837f64812503653305f3d9d121089e2591139261,2024-06-28T15:15:03.047000 CVE-2023-27637,0,0,f5e96dafa954f10818b922bc2fead2cc059311446dcc0a11d6a34dea4a1e0644,2023-06-21T15:58:54.023000 CVE-2023-27638,0,0,5cd34a25b1b1c666172842fadc815a9184e7e8ac62405db4dd44ac58263f8cf9,2023-06-21T15:58:51.637000 CVE-2023-27639,0,0,daab8d89214e5f23c8ce51895b80b9b851613ddfb70e7707d1ed360b4ff90038,2023-06-09T15:48:23.720000 @@ -235254,6 +235254,8 @@ CVE-2023-47798,0,0,3b9fb1a8a778ac4c9269af63ef2a5b9e595845f1ddbc1285b61e1dfcb855e CVE-2023-4780,0,0,4cff72eba85b96f4e6045c3400821db8dd455e812d846d56420d9a620e8bf13f,2024-03-12T15:15:47.163000 CVE-2023-47800,0,0,9cbe99578555fa26aa3cb6138641dcb7a5e8db7dd174d15705d61b5b276e192f,2023-11-23T01:18:44.300000 CVE-2023-47801,0,0,49428a541bf023b57ad05833c6b052016ada58145f5f6d2b0a95b2bf227dc9f4,2023-11-20T19:20:50.270000 +CVE-2023-47802,1,1,986f3214212428adb962cc7019633c92035dc4427db2b4cf1e004b2b6dd7e8bc,2024-06-28T10:27:00.920000 +CVE-2023-47803,1,1,da1c27105a9adf5f4aabfc268b95d17247e9cf14947eebbbd4ed93713f808998,2024-06-28T10:27:00.920000 CVE-2023-47804,0,0,8cc781754b9be91846a1e06369ccafa7247568c8584e558548175286cca2f3ef,2024-01-08T19:22:31.183000 CVE-2023-47806,0,0,7b50348b1495569668983d7fd6727ca5aa56e42056972d5562ce39b1ee52200b,2023-12-21T19:09:43.420000 CVE-2023-47808,0,0,b547757e8561898ffa9c68dfcce7924cfe9fd186dce708fea538222bf643a961,2023-11-28T19:27:25.577000 @@ -238655,7 +238657,7 @@ CVE-2023-52719,0,0,65e43b315ae65d4018c9ebb1383b277dbab2292da3cd20e7d210eaecc0410 CVE-2023-5272,0,0,812d9b2d86101e770022ea5fdc9753e8d0c371cc8c8892a4e2c903d747bdebe6,2024-05-17T02:32:57.117000 CVE-2023-52720,0,0,75bfde3295801a77c4f6473b23346451d10c61a44e23cf0480e483b8b4e9675f,2024-05-14T16:13:02.773000 CVE-2023-52721,0,0,98d08c504cfe7b805234b0d4bd2dac9d9340759f28e2f1a76d8fb0ecc63116c4,2024-05-14T16:13:02.773000 -CVE-2023-52722,0,0,98127abf72f40ccdfd330396916afd82fb054ba100d5c84d9a9427744af0fae8,2024-04-29T12:42:03.667000 +CVE-2023-52722,0,1,1cb69373fa2e3f9acfda8cf3f1059ac59bcd836ce4838b0dffed4f7be87d9c0e,2024-06-28T05:15:10.640000 CVE-2023-52723,0,0,583a4c96a7b28499ddb7ff561365e6e19aba033c74ad8d268661d6153971a1dd,2024-05-05T22:15:07.487000 CVE-2023-52724,0,0,e4f95bcab1195f846dc270610c1bdc3ac2e4854ca9278c47b39a202d9f9600b6,2024-04-30T13:11:16.690000 CVE-2023-52725,0,0,88d4f88411bb4be959efdeb51d80e463c208ec56315d110e44fcff8343b01a06,2024-04-30T13:11:16.690000 @@ -238836,7 +238838,7 @@ CVE-2023-52883,0,0,60288e6afd3acdd5078c57ea111f332b080b703e7c9ae57294260ecafe90f CVE-2023-52884,0,0,3ab17bbd7764403ee078e65ba1cc3c50e85e943699ba320291de13c4366192b4,2024-06-21T11:22:01.687000 CVE-2023-5289,0,0,e99a2312fffac7e548d9067401ea1735cab5340b5825bd2426e3171dd9b0909d,2023-10-02T18:13:04.227000 CVE-2023-52890,0,0,a0eebe139551581f49cfd3b7f68f49883daf2a40bfb5a3949932cb006cd09360,2024-06-13T18:36:09.010000 -CVE-2023-52892,1,1,eea6a9abee73952a876bf0dfa2de1ff48d60f8606c9875841e66534f4bead4f5,2024-06-27T22:15:10.277000 +CVE-2023-52892,0,1,61499b3f768ccc401ebae0ffacf07733ca800a4fed57a0222ab20920a0b1ac50,2024-06-28T10:27:00.920000 CVE-2023-5290,0,0,755547461c1ffe140ccfa395ab853f280b1d991be6ac36b66243260a063192cc,2023-11-07T04:23:48.727000 CVE-2023-5291,0,0,883b747bfd1d6788133af6b41df2a1418b2cdede81e8f6778f889cd9ac7f0a65,2023-11-07T04:23:48.757000 CVE-2023-5292,0,0,4cc839ef69b87bcc6a5b374e7a356353ac58f85130526f66d9ff0dd59cb98e24,2023-11-07T04:23:48.910000 @@ -241752,7 +241754,7 @@ CVE-2024-1326,0,0,f742b2e1b0f964f5a5861c38f5d4ab056095ec8f5957f404653a524040bbf1 CVE-2024-1327,0,0,1b6e3f0296467e9f6b424925712e479dea0088dc2698e1adadd7f96bd6f1e88d,2024-04-03T12:38:04.840000 CVE-2024-1328,0,0,1e360ec5f794b47c3c1949d058d4dcab1ca058a0302ffe54a63801cf38181f90,2024-03-12T12:40:13.500000 CVE-2024-1329,0,0,c251ab89131ed5db620ce7b9371daf5508a26377e3f0f0d0996003e3074e8cd1,2024-02-15T18:27:28.837000 -CVE-2024-1330,0,0,934b35c1d869ec3ed054e547fed219a236f4edf5dda0e83c87ab97880b7f7b2d,2024-06-27T12:47:19.847000 +CVE-2024-1330,0,1,0875f448ca8ca2cb13f0b11aa8869613059f2ee4aef3a7abb81ead9c5c3d291a,2024-06-28T13:30:35.033000 CVE-2024-1331,0,0,1deb1e21efa47891bffcfc0f7c5a5a4e56a2cce5d50551f8ec8837f30ffffb10,2024-03-18T19:40:00.173000 CVE-2024-1332,0,0,ce91a247ee20b5086ffc922000a1236f0f0a17c39483df8ffb3ea515e6b84e26,2024-05-24T13:03:05.093000 CVE-2024-1333,0,0,258128469d54cc44538629ab13a661542f0353cc3076e7f49f79a63a3b1847c4,2024-03-18T19:40:00.173000 @@ -241909,7 +241911,7 @@ CVE-2024-1488,0,0,03e683b77c18e258ada6411156a13c686c4496eec0687a6c9cafd2107fba5d CVE-2024-1489,0,0,601abc5a034fbcf389e475f712bdb62e609e01342eb7a5cc6cdf4f20f6ce0143,2024-03-13T18:15:58.530000 CVE-2024-1491,0,0,5bd5c8d4823c76c59f53c9f7559e7fec7b518fd1a891195d4c1b847086d33147,2024-05-28T17:15:09.103000 CVE-2024-1492,0,0,ac491e1ac05085ffca5a01bc169673ef656902c869bec5c48f97ccc7785388e6,2024-02-29T13:49:29.390000 -CVE-2024-1493,0,0,7ccbaf932ab8e6585cab4eff5ae23acc60967ae45a6fca5c3ff89f8d09fcaa87,2024-06-27T12:47:19.847000 +CVE-2024-1493,0,1,14f9de221ca66918d8bb965d46137a71933927256deda2fdf3c9e0cd51c79b69,2024-06-28T13:24:27.063000 CVE-2024-1495,0,0,fb62d81a04863e1feb1aaf54e194ce1d2be35e43a2717c4349592d976859a74a,2024-06-13T18:36:09.010000 CVE-2024-1496,0,0,cb4e1e2b66486c1532bf5fd9642c761fbe286057f303a98e25c71b95ed8fd1ee,2024-02-29T13:49:29.390000 CVE-2024-1497,0,0,84c0cad6cfa5eb0a51311cf784383979e7b18f97e3410e261be2597241b19a2b,2024-03-13T18:15:58.530000 @@ -242187,7 +242189,7 @@ CVE-2024-1812,0,0,1a6f9eeab96c73268af7052134c8cf1c44932ad69fbc301edf8d35b130e7f4 CVE-2024-1813,0,0,7221461b551b49805924c88f7a02ee625bae550432e647062e4543b6083025c7,2024-04-10T13:23:38.787000 CVE-2024-1814,0,0,0b1e2db7106be181c074b53f672647c26a1befc789f8a090beaccc8e7ce1a1ab,2024-05-24T01:15:30.977000 CVE-2024-1815,0,0,9977db768a350aa8d7588584513fe0dfb6e464418c1beb6188f5eecf3642f719,2024-05-24T01:15:30.977000 -CVE-2024-1816,0,0,b1ed5baa2b5a7916f5841f4e90729eed84c85a9866209ff58997cf068079260a,2024-06-27T12:47:19.847000 +CVE-2024-1816,0,1,37039c5aa8e78ed597146b428b713e637e3911d0ce7a4a2899f1583429570eb5,2024-06-28T13:23:54.380000 CVE-2024-1817,0,0,d22678ba5046366220ff2f5ee22240282d315c7945fb2fd131031a18112a5a4a,2024-05-17T02:35:37.207000 CVE-2024-1818,0,0,160ee525d5ff48a751a727de0287a62c274d8c7c0090e0c76c9649776d3b8ac7,2024-05-17T02:35:37.310000 CVE-2024-1819,0,0,200100b2029b16af7aba6a64011b8f852960cff67c1c8b594d8a140448c1f883,2024-05-17T02:35:37.403000 @@ -243495,7 +243497,7 @@ CVE-2024-21905,0,0,adf99f19af2fd4f47febc9f1430872cfbd6f08389bdadd5f441acb45fc9c4 CVE-2024-21907,0,0,e97acedaa5fff8f35a2639917d8b0e8affd6b5d126dc549f4b2d35936c62833b,2024-01-17T15:24:07.360000 CVE-2024-21908,0,0,329abb805b48ea46c40d9625a0e5a18857ae42d6b89a82f5c3cf797095821263,2024-01-08T19:46:41.157000 CVE-2024-21909,0,0,1862a33cb8cb7c096543042cface003ed2658c185ec7603674a262510a57f13e,2024-02-08T02:15:40.883000 -CVE-2024-2191,0,0,2460421a7ffdf167d08d45c29ac9e110bbd65ff27eb0890bc81c0eeeb0fd9c1f,2024-06-27T12:47:19.847000 +CVE-2024-2191,0,1,5f2d3b23d7499d30f2e25b0242516a7fca1014a998869f479a39c5171d524a39,2024-06-28T13:23:23.787000 CVE-2024-21910,0,0,43ca7fc1e52b2bce376dbad269237609f1115a9e3e85611002acd3d35f8eee88,2024-01-08T19:46:25.757000 CVE-2024-21911,0,0,30b0952621022b198f37c9fc7c47e2aaa3233be56e7cd5684ca7f588e4860d48,2024-01-08T19:46:14.513000 CVE-2024-21912,0,0,e55852665e09c5ab48cbae6c65a3f0dbff3703123b8a6aa762360ad6e81dcd4e,2024-03-26T17:09:53.043000 @@ -243733,7 +243735,7 @@ CVE-2024-22257,0,0,874ff0a72fdff7945c5fa3fbbe0cdd5ca05cc513db9be5811beb7a84e897f CVE-2024-22258,0,0,73834c066fffbf1ceac081ac0d8fd511b8fd9e870301a54667895cd45741a179,2024-03-20T13:00:16.367000 CVE-2024-22259,0,0,dce7d33f8caf96926ed38e47ae4f4d2a0e606a3507b6c30493d6119b160a21fd,2024-06-10T18:15:25.853000 CVE-2024-2226,0,0,ee8f1ca60db458688b285f09c24138ba2af43e7eda48e7abf64d7861f3a6fd0e,2024-04-10T13:23:38.787000 -CVE-2024-22260,0,0,d47ead4d70994d6b3b2b812a4ec5edbebd512d4eca524938692829a03e0b2903,2024-06-27T21:15:13.470000 +CVE-2024-22260,0,1,1800eaba107462f56167bed05f6ecba42f4ea33d7ec01a035d5fd1b4f699d4b8,2024-06-28T10:27:00.920000 CVE-2024-22261,0,0,becda971f9fe2bc0796e849a1ca6efcee98df6406cf540f6a7792c4f11b5b746,2024-06-11T13:54:12.057000 CVE-2024-22262,0,0,f19b1c11ec8069ac727f7996014f3456fd5a6417d431b01d11ac200419a9bbec,2024-06-10T18:15:25.940000 CVE-2024-22263,0,0,05e1e7315e7f035b5eed904b4ce84da90b832cc34c42840059ea59ce5d4610d0,2024-06-20T12:43:25.663000 @@ -243744,11 +243746,11 @@ CVE-2024-22268,0,0,8ac3cbde6056dd76380b18daea36d084eaf68822fc6e2befa66f62359bde9 CVE-2024-22269,0,0,e5b2481e914f4cbe2d5c3a7c9bd35107871ac3a1f2df2e0bafead5f5e86a85b7,2024-05-14T19:18:31.490000 CVE-2024-2227,0,0,a04566641cf07b0256d6370713fe01392f720fcac34bba4d9533a8931d87226f,2024-03-22T19:02:10.300000 CVE-2024-22270,0,0,6ddec6950380375d517eada92585a48899328ef96a9cd5eb66f2637f566ac1fc,2024-05-14T19:18:31.490000 -CVE-2024-22272,0,0,bae04a7acade44e80120c8fbc56ba3a23be1203682fbcfb72098c828a33e6c85,2024-06-27T21:15:13.670000 +CVE-2024-22272,0,1,adae0aee6ad029e4fd483a8691d818f9453c2dae8103d6feb214d470c1deea16,2024-06-28T10:27:00.920000 CVE-2024-22273,0,0,16868e6e004c6ea2c682b722d1af123cd0ac6fcfe5ea535614be88cbaef5ca1b,2024-05-22T12:46:53.887000 CVE-2024-22274,0,0,da89bea76d6b538861a6666c1640acb76ac100e4dc1f77b4f4f466724f6cc406,2024-05-22T12:46:53.887000 CVE-2024-22275,0,0,d091ffc8d821e68d75dc2e136f38c753791a1420e1604ca18001c3ee3e374585,2024-05-22T12:46:53.887000 -CVE-2024-22276,0,0,d72d143bb154a6d9e5a24b5677b750c0de230e9ba6e6df5f74b68ae822c64aab,2024-06-27T21:15:13.860000 +CVE-2024-22276,0,1,84ef821328733e6d2023f2ca9295825f754ca59ef6a3ea10fbc3d2996560b9b8,2024-06-28T10:27:00.920000 CVE-2024-22279,0,0,ff0edd9c060816dc238726f665fb413b790bba614b84113a6241bd5b06ac695f,2024-06-12T18:04:20.147000 CVE-2024-2228,0,0,9da409d4c88fb5c41c04e34c5096b8810f55668a8720e19e0dcad976dea69ce5,2024-03-22T19:02:10.300000 CVE-2024-22282,0,0,53d62e993d25bddde67f64a9b7b05dfd45a21e7eb7c9bf0be8fb90ec2911d888,2024-02-06T16:55:19.983000 @@ -244529,7 +244531,7 @@ CVE-2024-23626,0,0,637302f4daaacd5a5cb951294be5d6fdea06327294fc148e9db98b0bc1331 CVE-2024-23627,0,0,c811c14299e5bb71bc028dfcb7069c6ba46f367fd759598ef7b57a23f3e77613,2024-02-01T19:38:10.910000 CVE-2024-23628,0,0,05366301abdda9aa5e2441bc35bf9475c538a6f211989a0a0e34f7a3f35a524a,2024-02-01T19:40:28.237000 CVE-2024-23629,0,0,3404cf0aae8c7ec8ddb9ab960cb4857a3e6388b7192f2fe216082c4209cb52fb,2024-02-01T19:48:49.857000 -CVE-2024-2363,0,0,ad925f80a4b108d3913769336a09bae6a5b905f141a6809e199f510b393f09aa,2024-05-17T02:38:11.830000 +CVE-2024-2363,0,1,5ec20808bb74aa1f105f4f94ff6bc1e4c9682dcf48a1d0ceb32feca578f7db0c,2024-06-28T02:15:03.630000 CVE-2024-23630,0,0,b230fb11a8a56ea0ee4ffa52bd076d3cf9e3b3a6aa51ae78affbd0ad4698cf64,2024-02-01T19:56:55.807000 CVE-2024-23633,0,0,e80ef76225d4b037d696ad86bb4e68cfa211a1fe81facf52563c7e76eace29aa,2024-02-01T15:47:45.103000 CVE-2024-23634,0,0,d2085c6c44ef7ae46bb5b74e6150164401643f2806df5f22a3878ed03baa2616,2024-03-20T17:18:21.343000 @@ -244589,7 +244591,7 @@ CVE-2024-23687,0,0,888c703c13765b4aadeca06043a7e3dd693e14ab5fbf0ceb683a371be24cf CVE-2024-23688,0,0,07f47d429f26f5d25558115321368745a1af1492969a475a8855a8882844f455,2024-01-26T15:53:31.397000 CVE-2024-23689,0,0,d7d4e018343e45ab929852f091e2e71006911f05a5c0cdd59769a6f5a80fdcee,2024-01-26T14:50:45.023000 CVE-2024-2369,0,0,6a36576cd82a0efb1a6cf47fca1f81c4dce9d8f7b0632041d2d5bfbf236b9c0b,2024-04-08T18:15:08.527000 -CVE-2024-23692,0,0,3037a4bb9baab5ff60134121874acfb2e423414b68b71d2bc535c5c74f99995c,2024-06-07T17:15:50.027000 +CVE-2024-23692,0,1,ee8d47877e8ab9dffb6b0f67245eb523eb65e271e0c42f12e1c102143c73f4cc,2024-06-28T04:15:04.597000 CVE-2024-2370,0,0,d585ae9ac856bf263bbb5fc87411ce61002d06f83e420348ba9623542805dbad,2024-03-20T16:15:08.270000 CVE-2024-23704,0,0,b6e98937a05e8e3c54df94790ffc1b76a7a7dbc7d0f374847ce3c9bc63a138f4,2024-05-08T13:15:00.690000 CVE-2024-23705,0,0,208f2921dda59fa7b14af1145627e3c7132ea207198825c4a670a9a509059f41,2024-05-08T13:15:00.690000 @@ -246231,8 +246233,8 @@ CVE-2024-26256,0,0,3e9fd5f0cea24d911e8a5503fa19177642b096dc511ef1b7b5f746aab8cc5 CVE-2024-26257,0,0,05a28d03660a848990668904555214fae6f00026d23d1677e03b07f5dc8dee4e,2024-04-10T13:24:00.070000 CVE-2024-26258,0,0,e2948ebecdedd5be931de1508231bfb7181246b38ce20c139f19e68ae9750f3d,2024-04-04T12:48:41.700000 CVE-2024-2626,0,0,0f82bfcd678adfe2206a7b49362dbece30aa00242a9c52e3ba26851c15f6dba3,2024-04-01T15:22:37.883000 -CVE-2024-26260,0,0,41c48505050cd0603f041cb40494690b052971f86cff83dd85a1f53d94faeb17,2024-02-15T06:23:39.303000 -CVE-2024-26261,0,0,a92f53c19fcf77a7e91b427c5773deeaf43265aee70f7079a798b91a424064e7,2024-02-15T06:23:39.303000 +CVE-2024-26260,0,1,65643e0ce4f84c48cec78b438df5085c99da999075d065c3a4c15ac8e9f87e0c,2024-06-28T02:15:03.190000 +CVE-2024-26261,0,1,513bda7a092399193b5a95cba8191ef907d5160f5f00ea0bdca470614c45d8a0,2024-06-28T02:15:03.423000 CVE-2024-26262,0,0,a4748d7a09e7d260eaca974dee962166106825a324e61fc447dca956e8a43600,2024-02-15T06:23:39.303000 CVE-2024-26263,0,0,c4633c34fc422b0df6796028bd203be5603de5788ca66703bc336bef8541d77d,2024-02-15T06:23:39.303000 CVE-2024-26264,0,0,3e3683b25d7114dec66da49f27a50a05cdd2aa68928b0036e1a0944a3384c0e4,2024-02-15T06:23:39.303000 @@ -247494,6 +247496,7 @@ CVE-2024-27946,0,0,c9531840dd136a0f133946794d791b9bacb6ed8e6d23a780175bef59f602c CVE-2024-27947,0,0,c94c092e88aea304f37c8fb397d1e5a721efabfb7d5a76b15dfe29a88b588073,2024-05-14T19:18:31.490000 CVE-2024-27948,0,0,3574af447a7b76fb1899e67b8012833798c5b2745f2d683ca134114c639d1382,2024-02-29T13:49:47.277000 CVE-2024-27949,0,0,12ee9b935394b527d1677a59b517c94d0df067a0b32bfff31d7cb2be5b4b5d00,2024-03-01T14:04:26.010000 +CVE-2024-2795,1,1,ea20dcb1bd832e00a5ef8e5b76e3f86c98bde89bc026f7133c0f8b2113d2d882,2024-06-28T10:27:00.920000 CVE-2024-27950,0,0,56d632dad56c45d949d3327de16e5b70b08683cea8ce7876ca8c59cc37ee8062,2024-03-01T14:04:04.827000 CVE-2024-27951,0,0,fb648e7b48d01c386d90ab877e0e6e5ad9ac54d7f9cf31355978050c72eaffef,2024-04-03T12:38:04.840000 CVE-2024-27952,0,0,fe624616809d2b08e76659d4d30a802797c8b1dea609a0360dcd8752b7d9cac9,2024-03-13T18:15:58.530000 @@ -248138,6 +248141,7 @@ CVE-2024-29034,0,0,abbcb2dba15b8f4921d05a8db211631f1cd87e65f2de49321a196077424f0 CVE-2024-29035,0,0,21701c3dd0407a32f3860c33eba458ab5265ec3a8caf169794b15ed3942b0b5e,2024-04-17T15:31:50.160000 CVE-2024-29036,0,0,f20370765a1c49d0a0bad775fe00268f4f8d50d24ef66d07a4f7dc0500570ad3,2024-03-21T12:58:51.093000 CVE-2024-29037,0,0,d14590394517ae3abb6cee2c5008c5f9a159ea7cb5e3f1665632e06ebb11aadc,2024-03-21T12:58:51.093000 +CVE-2024-29038,1,1,90feafbd1bfe090ed33babd8a4121b4be7dd44fa917996a4b0da2a43320d3b6e,2024-06-28T14:15:03.033000 CVE-2024-2904,0,0,ad94cde058aa186716aa9a9e0abda85712b8f6121542c812afe32aed48147ca1,2024-03-26T12:55:05.010000 CVE-2024-29041,0,0,062cd423858e5d93d3fcaca6dd38a28eee29d2cae2776de71c0c9845b66bbfc2,2024-03-26T12:55:05.010000 CVE-2024-29042,0,0,1acd40f3f2614341c5d235ab7d1243ecc16ed46461e3f61d34bea944cf83e729,2024-03-22T19:02:10.300000 @@ -248450,7 +248454,7 @@ CVE-2024-2969,0,0,6a92a8306d48d89fa5e78ba3ed0ad9ff22c73e6ed21c55f23493a4ccc01056 CVE-2024-2970,0,0,55e4260b924ae12c92b2afb309e159a34e3ff23ffc5827039ee4146bc8707502,2024-03-29T12:45:02.937000 CVE-2024-2971,0,0,898bc718d43d0c390c6d16657d6a8f74b1bed4195ca2be9f6e03b60807e37565,2024-03-27T12:29:30.307000 CVE-2024-2972,0,0,152d903d5348ef9a28736b9da1b981c53c5565cc38a67b052e47645292e97e48,2024-04-24T13:39:42.883000 -CVE-2024-2973,0,0,b06d7e5cb8d56afa4aff1bb172244431230acf3396195264d253acb70b56c4c9,2024-06-27T21:15:15.037000 +CVE-2024-2973,0,1,b7c9e09de444b51c55bed333c2b413927266920f2185557e2ed2f3ecfa098739,2024-06-28T10:27:00.920000 CVE-2024-29732,0,0,f91e9a53bb8c78b9eaa9a43eb2f41d18e7980ac57e838dd405b45ee97833017f,2024-03-21T12:58:51.093000 CVE-2024-29733,0,0,dc724364e3bd25549064de1d754c0f95dcc52779e1dd6513486011b2c63f334e,2024-05-01T18:15:18.867000 CVE-2024-29734,0,0,8d99461dc9b8889d99315bde49edbce5536e3a20b88b53095157d8f0afc148b5,2024-04-03T12:38:04.840000 @@ -248825,12 +248829,16 @@ CVE-2024-30102,0,0,fdb60017518c4e4447c4f87ac5e20b8bd141f8c977ea7ed95409f58601a5e CVE-2024-30103,0,0,e9b11315180cc2be70516f393013c4d68dd205d4a54691a3e15d1cbe00247ba4,2024-06-20T17:26:40.603000 CVE-2024-30104,0,0,5a9d1985e988cec27229a284222c230de4fd29fc24d0330a38548721a0729d9d,2024-06-20T17:27:01.447000 CVE-2024-30107,0,0,7e9f39013645f69ffc09f932047c5fded8481e31de256075b8ab56490f9048bd,2024-04-19T13:10:25.637000 +CVE-2024-30109,1,1,6a8a59a3bf8868bc11960f386f3b1ccf692b85f5ec7ca1c3028fdcd4f6f4463b,2024-06-28T10:27:00.920000 CVE-2024-3011,0,0,1567706f33ba4a3729190a5acfa17d903c76e23445fbf38d371926fb70a5af71,2024-05-17T02:39:40.533000 +CVE-2024-30110,1,1,31ab34f1dc971d2399c4b149c7b81d5c8b84b447a4e58f0764d923bfa4bd3cfa,2024-06-28T10:27:00.920000 +CVE-2024-30111,1,1,20afbe01364d348dba165503ff4e528be7a6b88d771c910736a2fa16ed5a768c,2024-06-28T10:27:00.920000 CVE-2024-30112,0,0,7776e48af0349613d262d23e79d54eaf55862c79c613ef95710a33f68285b593,2024-06-26T12:44:29.693000 CVE-2024-30119,0,0,faff61cb55bb1e1c818b9460a2a056f4c8970e03380dd9d518774564c9b27a5c,2024-06-17T12:42:04.623000 CVE-2024-3012,0,0,3d13067eee5369169a098d5c023f7c1a68bff1bb4361076791d74ce86fdf610f,2024-05-17T02:39:40.620000 CVE-2024-30120,0,0,e36717a45c134ce96ee2f16d093d8717c8dcca8c5bf419fdf3e6a16688a2f2e7,2024-06-17T12:42:04.623000 CVE-2024-3013,0,0,d99aebfcd4c3fad166b5c8782b32734185b35fca38a39501e4e58d010c943884,2024-05-17T02:39:40.710000 +CVE-2024-30135,1,1,ad020ea2501c3991e1de3dc44d6750fe991c886e28a1e4b4ce308833b4998bdf,2024-06-28T10:27:00.920000 CVE-2024-3014,0,0,e11526156cd340114892789199ac2e1f4135e56af54eb1c02f7e35e8cfbe961d,2024-05-17T02:39:40.800000 CVE-2024-3015,0,0,5bfcc2df8ce380675198b2d677a05b9fe4d1d4de944a30f5dbc4a57145492eb5,2024-05-17T02:39:40.887000 CVE-2024-30156,0,0,f042a6e9e665ad25cb33e6086a6b1915f5ef73ca21458bc60ad138bf3a5430b0,2024-03-25T01:51:01.223000 @@ -249525,7 +249533,7 @@ CVE-2024-31106,0,0,7cb1f35daa18e527942f97955d4cdc7012d7a5e8bc61668cb848c91352d21 CVE-2024-31107,0,0,b69b8308dca1c03345bc5c4ddd842b58a0a34c0913dd806068e33a5a7ea13d89,2024-04-01T01:12:59.077000 CVE-2024-31108,0,0,e198cb5e9a429619e29a035a74c1776abb842099061e8ee67790619ad5916e5b,2024-04-01T01:12:59.077000 CVE-2024-31109,0,0,3766de0285c03422fb77f1fd2a4106a3e09e42f3bd086e20e704d883507e7c67,2024-04-02T20:31:58.463000 -CVE-2024-3111,0,0,c28dac10dfa00fbc13fa7cf4425b6881fad9ba358e5a487c3a5ffc0bb0a01267,2024-06-27T12:47:19.847000 +CVE-2024-3111,0,1,43fa46c4777800770b9731316a994178f92237840028aec31c35f1e2eb709766,2024-06-28T13:28:47.937000 CVE-2024-31110,0,0,cc696090cfd929541a1ca3b42d624a66dc89644b2049217890247603bee15f04,2024-04-01T01:12:59.077000 CVE-2024-31111,0,0,20d45ac72a8dd6f4bc57646746c10654f3c9393a1d038c4ffdb0368f82ed7ab9,2024-06-25T18:50:42.040000 CVE-2024-31112,0,0,4c0b6d124815c5fbc71413fa9db9ceb5adb5efe4d3f57754f8397ffa9f3c1ac9,2024-04-01T01:12:59.077000 @@ -249546,7 +249554,7 @@ CVE-2024-31138,0,0,80619d8b23ffb923a4bb521ee1877f29e2a086a5161850672cdc2424af6c6 CVE-2024-31139,0,0,6254efb24474a93bf19fb224a952376f20b94666e671b313ffb9fb5d6ba4e123,2024-03-28T16:07:30.893000 CVE-2024-31140,0,0,8ac72cdd6b5f7f56e71e87459ff46ad8714fcc8b963def523c845a786f9f62ca,2024-03-28T16:07:30.893000 CVE-2024-31142,0,0,1e729ac327535cc35260a14a69a0b20eeb370b6701c117105871d2595322a9f3,2024-05-16T15:44:44.683000 -CVE-2024-3115,0,0,f88eaa86da1c954b20f1176cdc0a9fef787b2ed4041bd6d2f7695ac324a82475,2024-06-27T12:47:19.847000 +CVE-2024-3115,0,1,ce15a233f41ff0461e80772019f46030689b0b2d2d5c745fde6ced2663519f76,2024-06-28T13:22:33.400000 CVE-2024-31156,0,0,da4c4994c24daaccd314311728d10a4342bd95e8cf67e2b87207a10f13558958,2024-05-08T17:05:24.083000 CVE-2024-31159,0,0,8f2140422377394a9df40aab7654ea68717fd5b1399ff91747ee6c2dd96f3205,2024-06-17T12:42:04.623000 CVE-2024-3116,0,0,398207d2760952c7d30e8a692022e3a890986df7c49b38076f15d6ef6a9e4edb,2024-04-23T02:15:48.310000 @@ -249917,7 +249925,7 @@ CVE-2024-31784,0,0,0055eda0e2e2e3cebbac3d895c086f3674073feab99e847bee4ca99f9495a CVE-2024-3179,0,0,5abb24f6a5051585dee8d043e9230e5c2a9202caf7e3c5044373b856d11a8a98,2024-04-04T12:48:41.700000 CVE-2024-3180,0,0,cb7e6ecd5dde884356237a2b2dbf7b6ac67d07b2baecdd8da937f602eadd96a4,2024-04-04T12:48:41.700000 CVE-2024-31801,0,0,76b9f35ed6859ef0acaad47e44f5e809d5f12f75f037ba060cfce40422774869,2024-04-30T13:11:16.690000 -CVE-2024-31802,0,0,2fb04f436bdf8bf851eb6c01611304703da60e13d8b6eb07fd23a1c3445d1b62,2024-06-27T20:15:21.480000 +CVE-2024-31802,0,1,3e784b6cdf1a165b3d21f2a1c540d8b026c9de6432feb4efe6875b7608e68ead,2024-06-28T10:27:00.920000 CVE-2024-31803,0,0,92f238036d017e7b84c8654e5a5e6072228cd9b3978fedfbf2bc24ff66d8e581,2024-05-14T16:12:23.490000 CVE-2024-31804,0,0,bf9f7f1f5a4e866d017f381caebeeb6f3ac0c44960962a1df77a955bc10f27e8,2024-04-24T13:39:42.883000 CVE-2024-31805,0,0,191a14c2d5ae7968331c5203389f4ad20337fe28197ac48f135f3f3b37941d31,2024-04-08T18:48:40.217000 @@ -252589,15 +252597,15 @@ CVE-2024-36053,0,0,672a3b34a9bdb19210396687438a3a5963248f4f357ce5db05db5d2496149 CVE-2024-36054,0,0,745f3c7e954612064b0267225a8d627bc9659c4049b0e182b852fe9bfc7c38eb,2024-05-28T12:39:28.377000 CVE-2024-36055,0,0,0f986ba9c1e2ba5209d6b7a2b636885b44374f594bbb5ec4625e72f54b29eca2,2024-05-28T12:39:28.377000 CVE-2024-36056,0,0,ec028c5add14708bdf202db488cd226acb08a71476882e9d398db176c5d0deed,2024-05-28T12:39:28.377000 -CVE-2024-36059,1,1,8734ef9009f8d358ca4113cff60d0109725f265a8ffcc62eeaea8f683f212e35,2024-06-27T22:15:10.437000 +CVE-2024-36059,0,1,998ab1a4c4804396ee5d95b6a046534f1c83a85e738366d2e437dee500263742,2024-06-28T10:27:00.920000 CVE-2024-3606,0,0,aad549bdf5ff1831d91b9701456650bb1ccc1938c3f938f0c7eb426394ab8356,2024-05-02T18:00:37.360000 CVE-2024-3607,0,0,af4721086df8378a380a0243b924575fce7196863af6b8319186a0a7c6039e9f,2024-05-02T18:00:37.360000 CVE-2024-36070,0,0,eb4d689c0fd52dc71530686149db340f07354ff188ce53f7ebe9b94f9b8be928,2024-05-20T13:00:04.957000 CVE-2024-36071,0,0,8064ac0267a543a843f6a87c1b9d3c051a2764efadb31f76520bd5d37151088a,2024-06-21T11:22:01.687000 -CVE-2024-36072,0,0,d52026d190aa0e57bb4468180ea7a1a21fb71ba5611c4ff652877d0e60170e2d,2024-06-27T21:15:15.327000 -CVE-2024-36073,0,0,ae13e54580447bee333efd4463cbfe61227bbd6fce25d0375b98eb24ad5d5f5d,2024-06-27T21:15:15.420000 -CVE-2024-36074,0,0,3d68d420aa5a5f7093e9db7c26b586360fa89ec46888ce12679a6de11192b833,2024-06-27T21:15:15.520000 -CVE-2024-36075,0,0,4ddb25ad25d9651c86c652ff70d98481b037be6963052baca4fc3229105d6a31,2024-06-27T21:15:15.610000 +CVE-2024-36072,0,1,adf5e914207ccf07bd5a80ea20223f9761ddfd7b43e10d7dc7df1dbe43c03ab5,2024-06-28T10:27:00.920000 +CVE-2024-36073,0,1,7f65c55d89fc8b6c5d3b4a7785da1b0dab1ec80e1ca112f4e573d11120d2dff1,2024-06-28T10:27:00.920000 +CVE-2024-36074,0,1,fe26ee3452dc25406d18750fc41c47c68bcae2cd3e67efb067c3985b2651020b,2024-06-28T10:27:00.920000 +CVE-2024-36075,0,1,8d5cc9c2586da8e812f17aeb43ec0f587b694ca668c9440829ea8da550a72ac7,2024-06-28T10:27:00.920000 CVE-2024-36076,0,0,7bd178b56b4ea91c0d10da16861cc8958caaaa1d0561d3821785629a0cb379df,2024-05-21T20:15:08.970000 CVE-2024-36077,0,0,24c001c4e142bc641d92d00f062a2471b2aa71a98c36262a8c3ab28738cd9b9d,2024-05-22T18:59:20.240000 CVE-2024-36078,0,0,c51f0267c8f676ff86e885fc858add33b498be4bce4ced499be9c0d55f68f411,2024-05-20T13:00:04.957000 @@ -252939,7 +252947,7 @@ CVE-2024-36742,0,0,2941ab796d29923e5003ba921e34147b367638496ca61de6313da56f2bc0d CVE-2024-36743,0,0,947029ef079964db2f975300f543b502c98bef02b4c5f9f3d5de943b90d777a7,2024-06-07T14:56:05.647000 CVE-2024-36745,0,0,c21f6d498139c367702b2a5b310b830e45905feb661fd13e2ada12120c92ab59,2024-06-07T14:56:05.647000 CVE-2024-3675,0,0,00d1234baac079cf413c516618dd0fc3e7ad5eadaec0ab200df9e28f23d3ebe2,2024-05-02T18:00:37.360000 -CVE-2024-36755,0,0,97a2b649a70ce95de27ecc39ec90584f35f3be7e902305178e50d99df5246883,2024-06-27T21:15:15.700000 +CVE-2024-36755,0,1,0d3087cdc86b4119e530303acbaf095f72e78ae16a77d0f4a8b01adcf870e9c4,2024-06-28T10:27:00.920000 CVE-2024-3676,0,0,afffaa433a0219105ab8db2fc3cac72e262ac997e8b5329e1239c5388df90382,2024-05-14T19:17:55.627000 CVE-2024-36760,0,0,897ef07013c673251dc351acece72f77bd0814f03b1d64cdffdfe62a5a19b3b9,2024-06-13T18:35:19.777000 CVE-2024-36761,0,0,041a212c076f1136e2779e71c78a9b4ede72b24b7b3151a3477ecc5877c87618,2024-06-13T18:36:09.010000 @@ -253149,14 +253157,15 @@ CVE-2024-37089,0,0,546734d08a472f24d21b11f96a62ff07ba2d9777252aa2840029efb67a030 CVE-2024-37091,0,0,70ef4cb5aa59df22f5d9bec3c45f39a3b926dd43e7416671f8860a54328745e5,2024-06-24T12:57:36.513000 CVE-2024-37092,0,0,ddf8bb50ed996f71f2c9e3e9b63faabe2c52ea8cb34e6f0fcdb53b1c55be2132,2024-06-24T19:26:54.367000 CVE-2024-37098,0,0,e259cf517a4b26891930426aed13a9c53ee339a8d724318e920ba4b291cc4d99,2024-06-26T12:44:29.693000 -CVE-2024-37107,0,0,eaa9cf5a94a28aaa8385b24580f4e0847a5f8e8f7ba8d50d5e3cfa9d3405c236,2024-06-24T19:26:54.367000 -CVE-2024-37109,0,0,f2a7bf283e738683324f72b6b020147166c767610404b259a82d4d2ec2c96435,2024-06-24T19:26:47.037000 +CVE-2024-37107,0,1,e1e665b99eff19349add9836ced9fe988bed019b20e4b821ff990f5cecaee417,2024-06-28T13:15:02.503000 +CVE-2024-37109,0,1,db0889e1d7d2a1ef5dcc67a2d3dfbd32c0e2f4e2cbde02826f15e64ccae72227,2024-06-28T13:15:02.650000 CVE-2024-3711,0,0,00ee502ae0ae8bdc802cd38eb1ec1e1356c10e1c18d766a4effd20297a066f55,2024-05-24T01:15:30.977000 -CVE-2024-37111,0,0,bcae7bf97d7f3827f938ee358d22e79506670e1281470a8c2aaf6ae323a22357,2024-06-24T19:26:47.037000 +CVE-2024-37111,0,1,2257ad3ccadca4c80305b1109feafea1f23c81cf8da2e182d0e85f183c413dd1,2024-06-28T13:15:02.750000 CVE-2024-37118,0,0,0ad56c9c4204404fc625d311f20c0b9c243a12023f3ae9f31f4a46be59aef39f,2024-06-24T18:55:07.707000 CVE-2024-37124,0,0,bdb1c2622a72a7efb103c3f5603bc06acb88520168a2b939ad78f62d410bde2b,2024-06-20T12:44:01.637000 CVE-2024-37130,0,0,e0f79c9f14be5102570781fc06be35c79666eecf04eb579171e468c9a760aecc,2024-06-11T13:54:12.057000 CVE-2024-37131,0,0,9d8793df78437fefb0a970a364558bdad589a0c15e132432497cef4b2151f46f,2024-06-13T18:35:19.777000 +CVE-2024-37137,1,1,876b5deb6120b71515a72548a35979c3fe73b22e5c052fdfcb9847d4c38f186d,2024-06-28T10:27:00.920000 CVE-2024-37138,0,0,c32a7c21b94d343f2b3f30b7a7dc2a266744d79653d9f1f3b9c08078539e5f8e,2024-06-26T12:44:29.693000 CVE-2024-37139,0,0,4be213816842328a788d9a10ebbbecaea533491c62f7e03adf240d5d001bdfb9,2024-06-26T12:44:29.693000 CVE-2024-3714,0,0,29d3de80cc1f6e0ff07b09e17d8d58f6e17e5f0164ed94da7b2235ed17131c18,2024-05-20T13:00:34.807000 @@ -253211,6 +253220,7 @@ CVE-2024-37273,0,0,8e9dee449ebc3c902c8a48603bfb19c8ba061254dd865164dc4adc81e5780 CVE-2024-37279,0,0,23b5ab6d6e7d20abbef93be4c8b8a6f2f980c082bdec809528b549006da1d24b,2024-06-13T18:35:19.777000 CVE-2024-3728,0,0,43844043222c66b8f700e8c46db9fa69a4e80d2868161363811005c77777bc69,2024-05-02T18:00:37.360000 CVE-2024-37280,0,0,549e00d208ea67334db7c6ceeb9cb79f781baad9a857e5758fd905754c6f58de,2024-06-13T18:35:19.777000 +CVE-2024-37282,1,1,af986c3c9c4d35a73432126f46db35f5d3c21ad1f56541935c5d8cad0cab057d,2024-06-28T10:27:00.920000 CVE-2024-37289,0,0,2fb00f90d13443feb2f6a7f1e7d138e51b10efb8192c90ecef8306ef2b5c5360,2024-06-11T13:54:12.057000 CVE-2024-3729,0,0,fe9208be005903b27f9e982914c8adbe6ffd46f8d19d93e705d785ecc61de3fc,2024-05-02T18:00:37.360000 CVE-2024-37293,0,0,f0da63058bcf58de65f1096623503997fb39c4c766dc2a028c111b64e3ba77cd,2024-06-13T18:36:09.013000 @@ -253349,6 +253359,7 @@ CVE-2024-3772,0,0,184d29c2faf230c27e7c42ad45c478e7862cbffdde795ec4220824e36861b5 CVE-2024-37732,0,0,c4e29c0f7175fe60ae396c5841d69538b22a36865a0b8a792362db7866454fcc,2024-06-26T17:49:36.837000 CVE-2024-37734,0,0,29ef61325a2a410f1ce167e31ddaa14dcadbade171729df78357519fd43864bd,2024-06-27T12:47:19.847000 CVE-2024-3774,0,0,430454733381ff5a96eb00158d8d932d4c087496720223836bce2968611b5152,2024-04-15T13:15:31.997000 +CVE-2024-37741,1,1,0c604ff9bbf0f4166edf09e137a29293b9badf54e94c896222941b0de67cb381,2024-06-28T13:38:47.077000 CVE-2024-37742,0,0,82d0f7bd796b50c91f2398edb7b6a7a5b24c344e32d17491fc5d315bfb23b371,2024-06-26T20:15:15.917000 CVE-2024-3775,0,0,a79253f4f0c7633f40fa5e33903553d0137ff03b4a2d8425a028bb5ddf1c6b0a,2024-04-15T13:15:31.997000 CVE-2024-37759,0,0,a304f980fb14a8758546bd8c3d1faef10aef26758667c469c634d191404d3cd2,2024-06-25T12:24:17.873000 @@ -253415,6 +253426,8 @@ CVE-2024-3794,0,0,153385e096cd7f2ece15b2458b2e9fc3a616d4e8c794288f506409f055c027 CVE-2024-3795,0,0,394c789f966243db6d7a4bfee356db0989703de57fa4252b7833b38d6036f026,2024-05-14T16:11:39.510000 CVE-2024-3796,0,0,8b56f1ae3498f70c780deb392dd70e4b0e2eb55d8dc491cebdead02f06bb596a,2024-05-14T16:11:39.510000 CVE-2024-3797,0,0,ee6a5db4c86b7a1cb7dddd0f923d514d4da716af84fa2cbea88db014d700ce37,2024-05-17T02:40:08.123000 +CVE-2024-3800,1,1,0aee6a42b2039215c9eaef826d097369b3f1d3a7d2da64d84dcd5461a8ce6887,2024-06-28T13:38:47.077000 +CVE-2024-3801,1,1,fcfad6b0ce02399c7d678f395fb128f6fba813bc23e60b051d597cd380d4b8e6,2024-06-28T13:38:47.077000 CVE-2024-3802,0,0,aaa997a68afe711762ac8536c5d0fad15740edaa6785e851a1495f0cf1f43e75,2024-06-04T02:15:49.290000 CVE-2024-3803,0,0,cefb64222fdf80706b1a9eb17e095bbe2f795f698686df2fa7fab7399b51955d,2024-05-17T02:40:08.240000 CVE-2024-3804,0,0,6cbbef68e2216a1b6714fc89ff2a16fd432ad36dd1cabadaff597df2e56ce61a,2024-06-04T19:20:24.583000 @@ -253431,6 +253444,7 @@ CVE-2024-3812,0,0,f751171253b8aec65ad3eb6d2474d3ee930fd7bd925f44cbf577354bd9ac3c CVE-2024-3813,0,0,86c7d7a0e1d2bdb1014ab3bb60ae32f55f8deca1eac3a0f16e2b300f92de13c6,2024-06-17T12:42:04.623000 CVE-2024-3814,0,0,6acb0a54e9f66c1fa69cea6ef32be45b05b60edf6b85ffbcc82a92f37f75e3c1,2024-06-17T12:42:04.623000 CVE-2024-3815,0,0,6bd5773f540c574f8e28080694e60819f34c3381e2d8c38f1a9a67bfdd0a3098,2024-06-17T12:42:04.623000 +CVE-2024-3816,1,1,2c60ea3e6d8885876bc73fbf9a3e32dbc86d267cf2e909cefcb1e686654852dd,2024-06-28T13:38:47.077000 CVE-2024-3817,0,0,46e4b3903939ad7f28eeb8afee28fc4c5b18be71847d60ae426ede3b66e11122,2024-04-18T13:04:28.900000 CVE-2024-3818,0,0,3b93c96d931c7712dba585285a5a0f954163c40c8ab2b4d2e42e74b7a416a166,2024-04-19T13:10:25.637000 CVE-2024-3819,0,0,070335cf0d21b4518c9cf130cbde224bb7db7bd3582033700dab419bc756cd20,2024-05-02T18:00:37.360000 @@ -253535,10 +253549,11 @@ CVE-2024-38515,0,0,a4e93bf008d994404518fb6f8f4cb2097325f0beeca2a32bbb087976322bd CVE-2024-38516,0,0,1e8a930f3bd7a4d706b02f40cc5af32d0943db58e97c615d4b2fd82bf154a7f3,2024-06-26T12:44:29.693000 CVE-2024-3852,0,0,3038e46972183e994310b2b410f139aaace8bd74e7e7e979d336a57b5feba459,2024-04-22T10:15:07.430000 CVE-2024-38520,0,0,41960473f376d2053670358f1b74b11612e5d6f0cfeae75c4ae0b80f5904ac0a,2024-06-27T12:47:19.847000 -CVE-2024-38523,0,0,c9e1099be7dc6f73731a61b1318fc6f6c4ab3e7c222ebd61d788c71fec7033e0,2024-06-27T20:15:22.003000 +CVE-2024-38523,0,1,ac61dc2188539e4a5eb60d89d7d71145cb5cdc9b9c189d4c888f2c0f8ba6ad05,2024-06-28T10:27:00.920000 CVE-2024-38526,0,0,e120e388df8ce9f77a5f20e08030a40910a306bc162600677388d663f60ddcef,2024-06-26T12:44:29.693000 CVE-2024-38527,0,0,9d30e9caf22ebe74cba027d0e20fbdb3b1d3bd82d6438824209935ed0cb0babb,2024-06-27T12:47:19.847000 CVE-2024-3853,0,0,da9bcb4a065926b49732a0dd79b2f07a12fd9777c9341906bc363e07df8725cf,2024-04-17T12:48:31.863000 +CVE-2024-38531,1,1,7e51a1a94b7e3f1dbfb713a6218bd2868a7c0a3d24f5ee13ff5b4ef9ee0ab0b8,2024-06-28T14:15:03.293000 CVE-2024-38538,0,0,fd8d0c414421b9d83404be9e58919f8d1c04c080d100c149e46c3a374cade8e2,2024-06-20T12:44:01.637000 CVE-2024-38539,0,0,bb07b10cb8e27f63a4ad4d8d9f4efc546da28e9a77992ff13895f8e8066ae4a7,2024-06-20T12:44:01.637000 CVE-2024-3854,0,0,1fc25728bc86cd277ba270d144040c69a89e438f315d3ebf85291cac5fb28ebb,2024-04-22T10:15:07.470000 @@ -253709,11 +253724,11 @@ CVE-2024-3909,0,0,6f873c0cc6c632ea64d9fdc22b1186e18e9f299b7d6a7c7d2c90d68e95f354 CVE-2024-3910,0,0,fa7c708844465781fdb892c0231d561199c2b00af1f9ed7e9ce37d02f9d0ff7f,2024-06-04T19:20:26.870000 CVE-2024-3911,0,0,421a4146dc8ebd653de189c62bd791d7d943c2a07a6c17029678795c1bffde3d,2024-04-24T13:39:42.883000 CVE-2024-3912,0,0,40b98d6972fd8b29682fb9d5c479312d61b03f7aa0ccbcb16e7844b5a5f893f3,2024-06-17T12:42:04.623000 -CVE-2024-39129,0,0,75d2aa95628d9e0e67b30f4c3ee7d251d3e741126c194bff4c5b78b82e0f4ad1,2024-06-27T20:15:22.277000 -CVE-2024-39130,0,0,ef4a9003426c0fa512bba876807184ce6bf3e7e04732de4f8a043db88bd4f29d,2024-06-27T20:15:22.370000 -CVE-2024-39132,0,0,9c0750f76b64032b22152ac3c24400b5a528f32722306c3ec0d3f78a9f9c6dba,2024-06-27T21:15:15.790000 -CVE-2024-39133,0,0,c2f2daf98edfc4c33418d65440031c388659d25dc6183662937744114a32c08e,2024-06-27T20:15:22.463000 -CVE-2024-39134,0,0,4a1c1b6790bdc411c0400ebf0191bf6f3ba3033344c04f684fa5c2e6842dd18c,2024-06-27T21:15:15.883000 +CVE-2024-39129,0,1,9312806d832c51933c3038527273101f0daf3190355080fae05f2347855542dc,2024-06-28T10:27:00.920000 +CVE-2024-39130,0,1,bb74f9ef3dbe13379a9cc84dff2ba44f866c8769dabd039c7af844d86cae9a61,2024-06-28T10:27:00.920000 +CVE-2024-39132,0,1,6ab3e2e5c27f090632724618bb18b9fb986b73a73dd0cc0fb1e85e724f201ff9,2024-06-28T10:27:00.920000 +CVE-2024-39133,0,1,bee3791c46864c4a7b9c3f57bb0aa0f799667bbae7ebc1a8d271d663377ee518,2024-06-28T10:27:00.920000 +CVE-2024-39134,0,1,f9c7f878a3bea6aa0088d9c47c65ec47ca6b4af545c333528f13dc2543300c00,2024-06-28T10:27:00.920000 CVE-2024-3914,0,0,4e5bf7e4bbf357662295118acaf46c6e90e6b4b9830d6a3e29a74e49dd14203f,2024-05-03T03:16:29.340000 CVE-2024-3915,0,0,a29a2abe3549638b7baa29d25d43b9e7f1e9b70435ac870f9f426e12fb2f2812,2024-05-14T16:11:39.510000 CVE-2024-39153,0,0,79c92bc44ceaef2ab705e7fa71d1fb5741f4e73f892ec71cd6ced02eb978bda3,2024-06-27T17:11:52.390000 @@ -253726,9 +253741,9 @@ CVE-2024-3916,0,0,67c028ed5cffa81651cfdb7590d8583ba32a4964953feede869ed8c9f6426e CVE-2024-3917,0,0,55f83f03b9292263c532dbe29e254e7b9925f1a39645bd6835596489dfabe52b,2024-05-24T01:15:30.977000 CVE-2024-3918,0,0,f0312710b8f2207cc4daf3e960aa8906c7e8839f8babda55f2853fd4763a97f9,2024-05-24T01:15:30.977000 CVE-2024-3920,0,0,5dbee28fbacc5f4bbc65481ff7f645499d60469b501d304207882ca441f74491,2024-05-24T01:15:30.977000 -CVE-2024-39207,0,0,2cd516a67a3264f02cf6eed3e3095d0c765dcbb1dd1b6890843ef96f9b073ef9,2024-06-27T20:15:22.557000 -CVE-2024-39208,0,0,f743ada7650bf3b48c4eb20264179d0e5ff698eeb9fd99be8d1ff1d704ca92e1,2024-06-27T20:15:22.650000 -CVE-2024-39209,0,0,5eaa07b15b91a734adae06dde0292f0d0cb3796081d4591a76a351c6014b96bd,2024-06-27T21:15:15.980000 +CVE-2024-39207,0,1,d8e667b43b76095c528f5867a8617c4177e3d9ac8aefab820b7b82f9e44a4991,2024-06-28T10:27:00.920000 +CVE-2024-39208,0,1,299e5852229d2647ff0440f276fa367c28bfc141139d729c8061f6806a3c58e2,2024-06-28T10:27:00.920000 +CVE-2024-39209,0,1,846eb9e93730bd8a4e0e342a01db126b493a0877c61de0d40de722388e34129c,2024-06-28T10:27:00.920000 CVE-2024-3921,0,0,dc44586c5c7e1c74f5850e7b4d244cf53da902f950a29ac6c4f232f966454542,2024-05-29T13:02:09.280000 CVE-2024-3922,0,0,9c35bb7d9bca4b5559bb1a4dfea91676bf1d098f4dc5952b2a109bcc30a68d2c,2024-06-13T18:36:09.010000 CVE-2024-3923,0,0,dcd7a979944a34edd9f4dd960691916feb4f3b194c37e215c41a761a1e13cac2,2024-05-14T16:11:39.510000 @@ -253755,6 +253770,12 @@ CVE-2024-3933,0,0,1d08d4e317596700be65ef5300f76b449794bb2d8b1542a98c34b9cd74fea0 CVE-2024-39331,0,0,d1461e039a637b8713f6e32e0beebb2ef4c2e762f105aa6c4f21bab6716eddb8,2024-06-24T12:57:36.513000 CVE-2024-39334,0,0,7a242c73a28ed17874e43348a26da2104869d7ef8d91c48fe0d8d7e00f57c31d,2024-06-24T12:57:36.513000 CVE-2024-39337,0,0,7c96f97902de4594057b22d7507f3218093cc9f703d055990179db138387110a,2024-06-24T12:57:36.513000 +CVE-2024-39347,1,1,f5c35927ca6bc6b01c0289886e48e1c26a8232470e7aa98c1613809c151fa9f4,2024-06-28T10:27:00.920000 +CVE-2024-39348,1,1,2a1296fcec22eeebebee71405ce5a2bc1d4e2308cef94a30f20c08930acb2eae,2024-06-28T10:27:00.920000 +CVE-2024-39349,1,1,e2c0ea0897db587383c2ec6939a8e8f30324733a4c2be5e6f6d88b1c64f32222,2024-06-28T10:27:00.920000 +CVE-2024-39350,1,1,2818f75b3d24495902c39d5dd3d46a13088a057469d774fcd7dea3e2c6f7b648,2024-06-28T10:27:00.920000 +CVE-2024-39351,1,1,73835562ac8c8f624018ac3f57736429a15ab60f19fdda354656ce6bebf2a36c,2024-06-28T10:27:00.920000 +CVE-2024-39352,1,1,a6ac4cc6df4e978ab98d2526b0d0ca42ad6af92292b36fb34063680949363975,2024-06-28T10:27:00.920000 CVE-2024-3936,0,0,1a9ebdb5653b792bdb8abb0138184d539d6d0e0c9af8da519de630a92cc0aee0,2024-05-02T18:00:37.360000 CVE-2024-39362,0,0,bcce186b51714eacaaf90ea1482046e3d6827a91536ea638843d27b3ed4e9904,2024-06-25T18:50:42.040000 CVE-2024-3937,0,0,47b49a69bcae07617978c4de23b5bd0d4eef565a4a3d61421481625d7a4abea5,2024-05-29T13:02:09.280000 @@ -253792,7 +253813,7 @@ CVE-2024-3954,0,0,45f1b348fcace6f84e3157e2d0f8a54fc4228bb396d26e03c9556cd235947f CVE-2024-3955,0,0,bba90f25cff74c274e08a67a3936bf55505a38180fc074269167b54bd0903537,2024-05-02T13:27:25.103000 CVE-2024-3956,0,0,84c84e343f731479baad188521c68e2e10d428da5ee4bd61443cf640ccedc17a,2024-05-14T16:11:39.510000 CVE-2024-3957,0,0,6e4e327328ad5c18e880466a103b162c10591051d90490bf0a67f6889d728425,2024-05-02T18:00:37.360000 -CVE-2024-3959,0,0,a5fa2c21f84d5047f1cd572ea850c9f68cbff13b7329e2f2567c00de6ac88294,2024-06-27T12:47:19.847000 +CVE-2024-3959,0,1,1ce1302f5c536ae0ba1596a30e53c3274b88d91eb780326b1103788329e8cf86,2024-06-28T13:21:52.223000 CVE-2024-3961,0,0,6646adb167e87c94860ebd5d8d983b1f971f6dc9fb8c86a5eaff8de194f86033,2024-06-21T11:22:01.687000 CVE-2024-3962,0,0,9de964d29f43823164300439a0e71453bbca4a5c1f5767eca51db600267798cd,2024-04-26T12:58:17.720000 CVE-2024-3965,0,0,6a2d24a56808a8dbb9160c44f3b8ea17e074c89928316addbe1fa0ca0aaeb11f,2024-06-17T12:42:04.623000 @@ -253802,7 +253823,9 @@ CVE-2024-3967,0,0,b2af76e65b0ac2fff588b8ab332f0978e5b083cdcdd41f3fd643403fe236fa CVE-2024-3968,0,0,cdd73cfcec56ac4302e4eb4a932f862086b9a3ed46ed5ff92d17197e11553e8f,2024-05-15T18:35:11.453000 CVE-2024-3969,0,0,793622b6641cb8c2dc34802adf1ab9ece645cce7d321b9faf1a6b76d5e28ec78,2024-05-28T17:11:55.903000 CVE-2024-3970,0,0,a6d2ad116e736372d8ee0cd28cd0cbfef25f3ce953ea92bdb2b1ac922e65eedf,2024-05-15T18:35:11.453000 -CVE-2024-39705,1,1,e01ae6b4dc9f53f24285e8ae3f6cb469153e76fc9da40419e7d8eb6fd6ccdf26,2024-06-27T22:15:10.543000 +CVE-2024-39704,1,1,46d48385d4d162b3ac12c54e9ccb839ccae9f35d96e3edd9d9bfd3968e019316,2024-06-28T13:38:47.077000 +CVE-2024-39705,0,1,34f8335644e5bfcc0826cf082dfb05192d87d4cbdcebdd20e96f35cefbdc73c5,2024-06-28T10:27:00.920000 +CVE-2024-39708,1,1,111516979aea28b8e657aa098e90e19a44667358e9b94bc0cc0d55aace553cee,2024-06-28T10:27:00.920000 CVE-2024-3971,0,0,1320cc801330d2d12e5c1ffdfdf6be7f25a4100ca447a2f7a5815c90f2431f60,2024-06-17T12:42:04.623000 CVE-2024-3972,0,0,336c66699a431faa29a5282b5eb6832d488e7d167b3d03dca5d4b3950fce0bec,2024-06-17T12:42:04.623000 CVE-2024-3974,0,0,30b94b89b01dd2c6057362330f67dc78937f3f3edffa0c5a57e7602f711f919a,2024-05-14T16:11:39.510000 @@ -253828,7 +253851,7 @@ CVE-2024-4006,0,0,cea97555ee62217aaca46943155964ba917aa17a210befae3806ab46c66060 CVE-2024-4008,0,0,d029b79ac31ad712a3b682c30b4ebfe0bc85fbedb677b90d81d7c6af81a5600e,2024-06-18T17:00:01.570000 CVE-2024-4009,0,0,82f6778b19e61d18cb6bad03fb43730c90019cd4ed3dad3648b480d1adbe3427,2024-06-18T17:01:19.897000 CVE-2024-4010,0,0,b0efc140530d7080bd135b9c9b54b60a51a2a7dd68cfd5652cea86eef30822c4,2024-05-15T16:40:19.330000 -CVE-2024-4011,0,0,499d630b94fe2497caec58fed4a5b7c2e7052b19d213a5df9f287aa95af43a12,2024-06-27T12:47:19.847000 +CVE-2024-4011,0,1,3791d0b8fb3f4c8257f00293727675eba680b52984c90b375af59f25fe8844d5,2024-06-28T13:21:27.280000 CVE-2024-4013,0,0,0bcb784021209931ac496a163310ba1a6e977841cc5a1bcc570cbfa4732ae6ef,2024-06-07T14:56:05.647000 CVE-2024-4014,0,0,321273114f78ac117c4f7a805b62a62926b23a5461c74b2705504b7b2e21d158,2024-04-22T13:28:43.747000 CVE-2024-4017,0,0,9cc899b07e49c20d1d42511c9c41a533c695fd74b1701843b26490566c6e33e3,2024-04-22T13:28:50.310000 @@ -254136,7 +254159,7 @@ CVE-2024-4390,0,0,e0f292a38c635f40275a1e1f559f35ce9d0874913091030d18dfd937968c27 CVE-2024-4391,0,0,606dfcb7000017430c9016faa846742a8e75fccee77649ce6753dd6affa1593a,2024-05-16T13:03:05.353000 CVE-2024-4392,0,0,42aa790771d322d803e80e41696519285313df90a0aa7c7e222147b471317291,2024-05-14T19:17:55.627000 CVE-2024-4393,0,0,104b496ba9688611beda7ef57b83424396e65d62ee7d7a6e8c7b696d3fc66e71,2024-05-08T13:15:00.690000 -CVE-2024-4395,1,1,ad6f992b7a68e2cdd40ed243eca906420597a16cb74f573795529d313b3e57c3,2024-06-27T22:15:10.653000 +CVE-2024-4395,0,1,e6c4228ae5c87523b0cf007bb4db130150d420515f2a30cbb7e5018a06861d7d,2024-06-28T10:27:00.920000 CVE-2024-4397,0,0,ebc3b333bdff80be7423291cb70bec6082bb12d724cf862660c9f0050112398c,2024-05-14T16:11:39.510000 CVE-2024-4398,0,0,4b7d20498f56e38cff1d1c0b655156a2b3f15862c52a314f7c4c607a40427bdd,2024-05-14T16:11:39.510000 CVE-2024-4399,0,0,3d19e4ab740018443fd6f7e134fb90cb1dbd4ba6681853dbea09ee003df9e238,2024-05-24T01:15:30.977000 @@ -254272,7 +254295,7 @@ CVE-2024-4549,0,0,6f08cdb7bdf1bc14a6d26c3a39b799558e43e67fec9cb01e1f3b74f80a87ac CVE-2024-4551,0,0,bde23bacf66d6a3da20cc3762eb00d7dfd03b874f5885e9a67eebb6780ae65b6,2024-06-17T12:42:04.623000 CVE-2024-4552,0,0,e23892055f41d68c57f1d172e5ea3d0a2ee46019e9d286872c115b7aad205614,2024-06-04T16:57:41.053000 CVE-2024-4553,0,0,8b88b932112e5db46be28f06635e2ec7d2585d5bcb10d64401d792f4b888b1c3,2024-05-21T12:37:59.687000 -CVE-2024-4557,0,0,e9c02b15ef137436b3668c0ffa8e71928fd1730ca7e88afab27790d52527ba2e,2024-06-27T12:47:19.847000 +CVE-2024-4557,0,1,66c84ceab02c8adff7c7e309e3c388a17800860cf81ce53b59e1c60dda9ffb15,2024-06-28T13:19:24.767000 CVE-2024-4558,0,0,fcb727202a9f43a9bf70ed6e025c63a0fd8208e4c1e99d83d4aee5cebbd5fae2,2024-06-10T18:15:36.760000 CVE-2024-4559,0,0,8380b9787705277bd83d6c6288181f3738a86c645934830c7e5c61a4edd855f6,2024-06-10T18:15:36.837000 CVE-2024-4560,0,0,01330bc30e6abf90cd0e894076fd4822775b90946ecfbbe71c3855f1f2c00212,2024-05-14T16:11:39.510000 @@ -254284,8 +254307,8 @@ CVE-2024-4565,0,0,67d994d050778f99ebea00dffeedd75aa1729789c9eb9581753d556845ec5e CVE-2024-4566,0,0,5bf64390fca62ba0e88600d1f0954e23dea48d7610695fd2ef891697361d3217,2024-05-21T12:37:59.687000 CVE-2024-4567,0,0,bff521ec958712c348010a89da0e0aec519b6a717613a798e9a8fee426de5e74,2024-05-14T16:11:39.510000 CVE-2024-4568,0,0,79c6e65478e2e86d702896e792fead76bbebdb118f8c0f66e6390a241a22321a,2024-05-07T13:39:32.710000 -CVE-2024-4569,0,0,b9942a680e02fb00eec7b62cc91255632af865eb60460677b854f563718f330a,2024-06-27T12:47:19.847000 -CVE-2024-4570,0,0,18ba4ab66d515e384d6c1d93d6f1a91dac1f70e83ef40a785d6725f84cd9973d,2024-06-27T12:47:19.847000 +CVE-2024-4569,0,1,2e4b27b05be8561bd3f260b3ccf0eed0d11ea74483878f5df5227737faa1c038,2024-06-28T13:10:05.153000 +CVE-2024-4570,0,1,c1cc5ae154200d1c8cbc554d2bd91b7f0d0e2fb1c25faf550303ad23eb2c106c,2024-06-28T13:38:13.630000 CVE-2024-4571,0,0,b379f15291a8a65b330c223bc6a31fd0a21b183a906c0a4077ca3cf5d38b8ad0,2024-05-14T15:44:05.750000 CVE-2024-4572,0,0,f5ca5c1acec751c453949e3111f6be45773ff402d3c1d2b8e88127a059aa7b1b,2024-05-14T15:44:06.153000 CVE-2024-4574,0,0,313ec0d117ac92e67c29da349740abe9395db1d3208f8156cb88d417271721b1,2024-05-14T16:11:39.510000 @@ -254362,7 +254385,7 @@ CVE-2024-4656,0,0,23093c7ec18a8f42da4c8fc1c86b9aa6984d979cf63954576e1d3325484051 CVE-2024-4661,0,0,e86145aa3dfc1a1e846a3970af65d72463f2a51aba17ea6b9d5a34de37b2fc53,2024-06-10T02:52:08.267000 CVE-2024-4662,0,0,271820e0248036cdcfeea2da470b958f93caba3600263b2df375c674d931507f,2024-05-24T01:15:30.977000 CVE-2024-4663,0,0,ac32c04a2cae0071224eeefc80f9a000b8618e2f1af1abc8eb33d3a9321c7d70,2024-06-20T12:44:01.637000 -CVE-2024-4664,0,0,3ff5098c150686569e1bc890176eceefc3c1cd5889aba764185eee9899f8cd60,2024-06-27T12:47:19.847000 +CVE-2024-4664,0,1,4d4aeec2b9d4ae73905aa066e928be5011f1ff91cc6ef5979d75af441c67cdbb,2024-06-28T13:28:06.347000 CVE-2024-4666,0,0,dde8d66c76bdf850b898b9f95df0d92f0ac3da730c1f32826d61843a6ef06bf5,2024-05-15T16:40:19.330000 CVE-2024-4668,0,0,3c2f34d91ee8c9aacf0f125fe94ffbbe9a611b8f1a54ab65e0473cea71baad6f,2024-05-30T13:15:41.297000 CVE-2024-4669,0,0,cb3ea770e599714f2de5e50bc4195c130850e813b58882b88bfe234ded1dcd7f,2024-06-13T18:36:09.013000 @@ -254395,7 +254418,7 @@ CVE-2024-4700,0,0,fd7d4a078191a1c31b5f2cfdfc5bd65709b727d250ddf2b831fd6aa84ec620 CVE-2024-4701,0,0,31c0f40927cc6a1a9aece611ec4491a5435df4e5c3a9daffc9dfb7710658ca96,2024-05-14T16:11:39.510000 CVE-2024-4702,0,0,391d02c5718dd442c026ca8f3973c4fe10894f8eeb54175158dc44cd7ef50d4a,2024-05-15T16:40:19.330000 CVE-2024-4703,0,0,2d052263ca03efcceae6f1a9b5190b0e61a795b9eb986321f967eeb0b20da62b,2024-06-11T18:06:31.967000 -CVE-2024-4704,0,0,a24a2b5651422d5e6d1cff31ea987cde737884d16a02e476634ac9d1f10878d2,2024-06-27T12:47:19.847000 +CVE-2024-4704,0,1,77378e98186724fe19847a6f6a69faba595c66ae1f99398832716c1d97a37422,2024-06-28T13:27:26.267000 CVE-2024-4705,0,0,b45f335ad46575e30510e82573f02b490faa16d9b6ee89b66a9844ff390b53aa,2024-06-06T14:17:35.017000 CVE-2024-4706,0,0,a959e13293b1a5966007eb60c79cb973f34e4d1d8bd1c12986cac54d81ac9a3d,2024-05-24T01:15:30.977000 CVE-2024-4707,0,0,d6a01a1a459dfd9ab21945d56af40919cce44b311e282118c993194b130db955,2024-06-06T14:17:35.017000 @@ -254552,7 +254575,7 @@ CVE-2024-4896,0,0,6456cc9b22aff68532bfeeb7637d5235216630d84771d1ec52d84fa467e4b7 CVE-2024-4898,0,0,4ea5d2aea02f0385cebab454e7d6b2e480bf3eab8470b7157c155067bed66344,2024-06-13T18:36:09.010000 CVE-2024-4899,0,0,67b323357bb49d8a98f8aef30f13d75a082b23ba24ff9269116bd3a4e859e8a6,2024-06-24T12:57:36.513000 CVE-2024-4900,0,0,bf21c014329db3bdc252e0dfea038d8cc3dd03e7972d5bd787db3fb8215cd9e5,2024-06-24T12:57:36.513000 -CVE-2024-4901,0,0,952ce87c1ffa85d1d49e52658886bdfd46cbbbbcb3602f8f4a628cd485f29dc6,2024-06-27T12:47:19.847000 +CVE-2024-4901,0,1,038977315c18c98069a655ab35eb2b501ae92d62e5deb196337fd2891dd989fe,2024-06-28T13:18:19.407000 CVE-2024-4902,0,0,190ae6556b466a5228ce6680f8d8f4ba4789cfafa6765b2e868dc7feb28ee1e3,2024-06-07T14:56:05.647000 CVE-2024-4903,0,0,74f6793baa838082db19325ded8d53157feab60a90892d7bb13ebdea205ed94c,2024-06-07T20:15:11.967000 CVE-2024-4904,0,0,44558a4b32290e2f940be10d0a83b859aa6fae2c01ef1c881d37a435bb46f91d,2024-06-04T19:20:52.380000 @@ -254846,7 +254869,7 @@ CVE-2024-5276,0,0,d26b15babe17aac13cc613675e4c4ad8d9ecb0a2798444e0b74aa892858078 CVE-2024-5277,0,0,08c2f56d5f9c6263336a67bd47c4fa52288bb09bcb2d8aeff245d6d39899edcf,2024-06-07T14:56:05.647000 CVE-2024-5278,0,0,ba4b6329b00a48ecb03cef9d2f0cd09adc7cfa79e9cd9e8eb891a1136335fb69,2024-06-07T14:56:05.647000 CVE-2024-5279,0,0,1f630d4d53c39cf2174e2a1edce8e1a5ead56a314739580d23644f8e4fedef07,2024-06-04T19:21:04.240000 -CVE-2024-5289,0,0,4e6d12eadd1d7aec48d78f08721bbd9963ec3e4de3aa23cd9b0fca2a57a18c53,2024-06-27T12:47:19.847000 +CVE-2024-5289,0,1,a02da373ddf627c39a88f09ba37230dcf191b29c84a32613f97fcb834cd9c524,2024-06-28T13:13:36.980000 CVE-2024-5291,0,0,e2fc6f2196c0b027b818fde218df99cf43b38b5676cf49b77deeb1aa303d7e78,2024-05-24T01:15:30.977000 CVE-2024-5292,0,0,07f972c0f93c6f07c6e8e023cab22706ed8252620d55ba7ae2411117029231e5,2024-05-24T01:15:30.977000 CVE-2024-5293,0,0,16376ebd06367710256550351fe628f35dc79a25571582fd2686e7d66472cf44,2024-05-24T01:15:30.977000 @@ -254957,11 +254980,12 @@ CVE-2024-5418,0,0,34559e586e07e049a8a9a117bb9e7e6c096f39aba1e2b0a8b270afaa7cae45 CVE-2024-5420,0,0,222f60409f504903340df1620dc6c61965c58fdcf056b93ed6f6eb922650d2fa,2024-06-10T18:15:38.367000 CVE-2024-5421,0,0,eeaae547052b8ba8c3bcc84128ffe19889621e4502681053a6fefc5f154f36a9,2024-06-10T18:15:38.447000 CVE-2024-5422,0,0,e03ce382c526ecd3bfff8f1e460f72d6c4cd6a77ce94308cc520da1bff4b9a65,2024-06-10T18:15:38.520000 +CVE-2024-5424,1,1,652229ce3efb08b2af82ded485ecd96ed96acec92b62ea8eed3912f6b513a5a4,2024-06-28T10:27:00.920000 CVE-2024-5425,0,0,198a56668ec12904be81f8cc7c88bdb7cf556c1b42bf2a53d8f10dc0d316d5c3,2024-06-07T14:56:05.647000 CVE-2024-5426,0,0,463afa72e5ec754a0d270917d456b87514b8458a939d0b61aeddc71dea0e191e,2024-06-11T18:03:58.213000 CVE-2024-5427,0,0,e86cc201b7d64d377c97e091606dc3804ebb54017d6aedd32a3c8a9e9f3ee33f,2024-05-31T13:01:46.727000 CVE-2024-5428,0,0,febfd9b4f977de4c3dc04e5fc8e71b9454e3ad809e74595cd325ad9561a295a7,2024-05-28T14:59:09.827000 -CVE-2024-5430,0,0,25f49a2988d968d6cde2c5fd2f15c3e4fdbe1025dcb88f0a4720e08f9ccb64e0,2024-06-27T12:47:19.847000 +CVE-2024-5430,0,1,7efa052e5c67b0f87e6df1de28f1712609827b19a2f0fa9870fd8d86a121a060,2024-06-28T13:17:34.380000 CVE-2024-5431,0,0,42e70412ed260a519e4eab6a93ce97c65de39fa732f015eeb2fa3ed75a13dc72,2024-06-25T12:24:17.873000 CVE-2024-5432,0,0,ab9a775fb9b6438a5280e4ab8778e43fe4811f4ee641a114adeb9e5317236c9d,2024-06-20T12:43:25.663000 CVE-2024-5433,0,0,d0946774ada383b4af0e78f23b9c449d05f83a7124810af4e383f90b0cdbda75,2024-05-29T13:02:09.280000 @@ -255045,6 +255069,7 @@ CVE-2024-5559,0,0,2783b17045adc6e83e5bf6acfe749e5c6489b786d017eb582b973704c839f4 CVE-2024-5560,0,0,f1a6e79f857dcb0da00298e85540b2901c155f3f4e8e842ef291f9f993b61e1f,2024-06-13T18:36:09.010000 CVE-2024-5564,0,0,dcea96840208d2ac663aaa4f0f3c3d4a29deb4a56217e3b064f75f0ccdd62128,2024-06-19T20:15:12.277000 CVE-2024-5565,0,0,830316f5c713618fdad4a0eda5b7296c22d5d93c87a8813197db3ff9cf28c4ee,2024-05-31T19:14:47.793000 +CVE-2024-5570,1,1,1f1ed1d460e111500125bee4bd672bf4d3d1893979a351b847eab3c62fb55e82,2024-06-28T10:27:00.920000 CVE-2024-5571,0,0,105c4e644019eeccf72c6e63813cdc36601b1b9a7e3cba5bc172df86631261e6,2024-06-11T17:29:03.277000 CVE-2024-5573,0,0,51a9ffd3da1267c4eef69596ac09c3dbea287270e0762cf7f98d2ed1f452fbf5,2024-06-26T12:44:29.693000 CVE-2024-5574,0,0,3e624f806d94dcff352fde1d5be73aa27a333a70d66ed500b1d4bd0c17214488,2024-06-20T12:44:01.637000 @@ -255058,7 +255083,7 @@ CVE-2024-5590,0,0,ca60332ff9933405c7b9b37e93d2404b53274b9ec741b4065c0c1eadbd60da CVE-2024-5596,0,0,c69cbcadf0a7f1e5940d842c2c9e90907cbda728581a745e7acd494576e03c9c,2024-06-24T12:57:36.513000 CVE-2024-5597,0,0,652827ff26b80eabae5b3eddf519a61b0da7de181ce61fd257911ec48c45cdb0,2024-06-12T18:10:47.080000 CVE-2024-5599,0,0,e4d8d3217ca804a33354b51b54e1f3f41ce0e1fc1f554dedfe90ad1a46a87370,2024-06-11T18:24:39.057000 -CVE-2024-5601,0,0,608253de8aa693ac16539d1fe627e243a8de70528c0293750be066054dc903bf,2024-06-27T12:47:19.847000 +CVE-2024-5601,0,1,e22064ef868b7763ab6a035a66dc94fbf47f776f059b7b471d5873c49e582f7a,2024-06-28T13:25:40.677000 CVE-2024-5605,0,0,4bb70fac398eb5e1fc6a3b8761dcfee9993510711b196c5d9f90dc1e34c785a3,2024-06-20T12:43:25.663000 CVE-2024-5607,0,0,9601597658129a089207c1a0e7e7267aceda952302ad39754d738e7307549543,2024-06-07T14:56:05.647000 CVE-2024-5609,0,0,f28c83e3e9d04345913d36de3bfdbd0d644d73b3d20045d9399b3368319c8d47,2024-06-06T19:16:09.920000 @@ -255073,19 +255098,20 @@ CVE-2024-5637,0,0,96c491286509bbcdcc2ade7ab7cd058d8e2fb8f26719ef46502e504a5a75b3 CVE-2024-5638,0,0,ecd29107ace2c39372f8ad7d26b6d92a031cf986dc4e07d96162e8140ebd097d,2024-06-10T02:52:08.267000 CVE-2024-5639,0,0,2322b8156dee01dfdab7b2069be6e0698e3a8613a841329b71822c874a14aeb7,2024-06-24T19:24:23.883000 CVE-2024-5640,0,0,86163b3d741cee0a4e50ef8553f0c82f1f0c15bd48d022d2d250ef0f55c23f10,2024-06-07T14:56:05.647000 -CVE-2024-5642,0,1,33495b687feca9874cbe52cfc5cb3e71516430584e7a6bfae4beef0de75f7320,2024-06-27T22:15:10.757000 +CVE-2024-5642,0,1,a72c1a45091101e2ba8bdf7801e25349bc52c7e8aeb3d37cbc93e3a1d150c2ad,2024-06-28T10:27:00.920000 CVE-2024-5645,0,0,1faba0fd6e05694e3fff7011c206b3ecee3c45fddb7e6c575993af231224a181,2024-06-11T17:57:47.197000 CVE-2024-5646,0,0,23240aeec5f40e46e6951e19eff4b72273567c29932f06ca0851d3144bb5ebaa,2024-06-13T18:36:09.013000 CVE-2024-5649,0,0,dc95f59c6efdf5cedf3d7e0f6c5bd262dc96a14a6be79337241ad862a0888246,2024-06-20T12:44:01.637000 CVE-2024-5650,0,0,65f855892c82055621a01afe5dfbac2eeb37ab3d50eb12f09dc0d9a40779b9ee,2024-06-17T12:42:04.623000 CVE-2024-5653,0,0,283076b6ccce08ae3d1ddf9d7f5983a839d66c80929543a8a527d0bfdf86a2f9,2024-06-06T14:17:35.017000 CVE-2024-5654,0,0,e22a0b433d38e113ff7c2fe935a2ac4a2eac96ee27b605312aa4a4c8d50d69a0,2024-06-10T02:52:08.267000 -CVE-2024-5655,0,0,6cb4e700bce2da265b6f2c552a8a53291e39f2ac0487d3d6e8de28ff5d710b14,2024-06-27T12:47:19.847000 +CVE-2024-5655,0,1,16e9b1f63d749b21100036f5c9070a5ffe6aef567bd66a512cb553f6f989c7f6,2024-06-28T13:16:40.613000 CVE-2024-5656,0,0,40c34e526e2032c59043b8834b1648291001d5e69a19326cbf74d918e6c8fbc1,2024-06-13T14:15:13.397000 CVE-2024-5657,0,0,223911cca93e713dc15810800584c4abe481e0e2143d3e3f3795c2d130280eb3,2024-06-11T17:40:47.823000 CVE-2024-5658,0,0,e420aa15660fefecd013eab0de4dee690ff0f155b141d8b1d4392a16606c7ad5,2024-06-11T18:21:52.377000 CVE-2024-5659,0,0,dbb598e16e86b9c719d485b541188ff6e8ea72d57c8ec148ee2290d2bb1f427d,2024-06-17T12:42:04.623000 CVE-2024-5661,0,0,e5f9f024a347e2b9638122ecde70323a03d416b3bde93f8e4f604cfeef08f405,2024-06-13T18:36:09.010000 +CVE-2024-5662,1,1,c30bff5b2d503274ccfb42c77a6a2f90af33779b4134c5919fad644e092eec26,2024-06-28T10:27:00.920000 CVE-2024-5663,0,0,e65ed9bd668d6456ce5b39954ddd0ae3860f1cde2bd069c4d43e4b5601627808,2024-06-10T02:52:08.267000 CVE-2024-5665,0,0,cf98b8118d31a45b868938fcf4b0239a4be77d7cb3995f06e552251067a9cecd,2024-06-11T17:47:45.033000 CVE-2024-5671,0,0,b302da9933b51baa02aebe638443397fc8a4c366af898c1301a8da6525832546,2024-06-17T12:42:04.623000 @@ -255116,10 +255142,17 @@ CVE-2024-5702,0,0,050114b692a9d22e1a3779ff238583d9efc9d6e8072ff7c077a659f94eb85b CVE-2024-5710,0,0,05f729e4a748b7e4b4953b6ee031d94855dac33c6d1a6f06f0abbd20c46252fb,2024-06-27T19:25:12.067000 CVE-2024-5714,0,0,d09606fe85d7a014a058870c51f9ff79e6af54534c316b686a2562e2d0e92e3e,2024-06-27T19:25:12.067000 CVE-2024-5724,0,0,03384c71395c84af225b0ffa60ba9818c028df2b73c4ae064cd0a263a53e8317,2024-06-20T12:44:01.637000 +CVE-2024-5727,1,1,1fbc88a30e9a1b5b66ae83f1b3e85e2a5fb8114d9d41f9dac322c2902c1d92bd,2024-06-28T10:27:00.920000 +CVE-2024-5728,1,1,5a889a67227481274c819df95431051019a211516033d5f988b49d47d8c66f3e,2024-06-28T10:27:00.920000 +CVE-2024-5729,1,1,e1aca1388a2cf611974ab50f0f578b9dc91c2e7eff3688e112f84f2c4fd97db9,2024-06-28T10:27:00.920000 +CVE-2024-5730,1,1,bce8aafe7f6412d1673f24d0d50a0ceda8b4ae213d0fc66eca08d164e5b22ae8,2024-06-28T10:27:00.920000 CVE-2024-5731,0,0,f8f18711dc1e7684e37f428b0d6e39ca275690790dad9599ea32c8e89b131e02,2024-06-17T12:42:04.623000 CVE-2024-5732,0,0,2b69cb5542c2f91e3e2021ac007049b3634a9137bdf0c325241236594abc7cc6,2024-06-11T17:57:13.767000 CVE-2024-5733,0,0,78152e13cdabf162486c62849d39e4c95e26727ad5623fb603c3826108c4ab9b,2024-06-11T18:30:50.690000 CVE-2024-5734,0,0,42e64867c1cdebe5031caec9548ec6393cd9bc290658f317ad4788de56fd156c,2024-06-11T18:30:16.727000 +CVE-2024-5735,1,1,cc0561f495bade816cdeaced53011b07f3cb6a0e24901667ac6b88439c52c12a,2024-06-28T13:38:47.077000 +CVE-2024-5736,1,1,525c83f0d9c4bb50f89240615c5f2211bfd076d0392343c37d0ccb4f622d76cb,2024-06-28T13:38:47.077000 +CVE-2024-5737,1,1,33e4dfb4b6ecc95a25b3463ae07a17fb1eb0a57cb72699fc113aff6b8c2d0ea5,2024-06-28T13:38:47.077000 CVE-2024-5739,0,0,4e4cf687173db1796e93002e6527d7eafacb6ad9e3e1f9441d82638a10b1e4ca,2024-06-13T18:36:09.013000 CVE-2024-5741,0,0,d3e87c617441ebc91021d514ecbbaffa42c181f23db631a685b052a1b8e8e820,2024-06-17T12:42:04.623000 CVE-2024-5742,0,0,a52d500d47b6c5d306e493aed82844a67ba1ec935bd3dcc9d1575df0fba9dc97,2024-06-17T12:15:49.850000 @@ -255152,7 +255185,9 @@ CVE-2024-5783,0,0,e65b469aba92209e135f01d801ec2e7ebd41770aa11624b30224f43d98aec8 CVE-2024-5785,0,0,b8e4d96c063df13aad53416cef79463db3c390621a0b569b6ab0f4db2568beeb,2024-06-10T18:06:22.600000 CVE-2024-5786,0,0,ed5396800d42f59a8cc5d452fd1faa0265b1965bb10ec68fd437a404a4a909e1,2024-06-10T18:06:22.600000 CVE-2024-5787,0,0,a3d405a0f4e66faab3a863affeada58e47a227c5d73cf2b53ea525af4385d342,2024-06-13T18:36:09.010000 +CVE-2024-5788,1,1,b8c011e09345f8c438c15d748dc7ecb5f2eb62164ea0c1da7169d985a2f9f593,2024-06-28T10:27:00.920000 CVE-2024-5791,0,0,424014ca254e257c8c57009775e061d0dd2abf87fc81691a50ea6d1a360bb310,2024-06-24T20:00:46.390000 +CVE-2024-5796,1,1,ee9ea77d6816c67e871ce0ce39c4d235af8efb4db7bec50166a494d6f8b7e47e,2024-06-28T10:27:00.920000 CVE-2024-5798,0,0,f6c60b5ac812e7711b355fdc9c4ea7ca1c381d5fa9189e95b5ac079c15b31d9c,2024-06-13T18:36:09.010000 CVE-2024-5805,0,0,d5f814a63108fa76cde55a23a7ee4c9d4c1228e8f74ac6f24226e1e9997c1554,2024-06-25T18:50:42.040000 CVE-2024-5806,0,0,05eca3ac8c1d3a60beb467559e1d11b02293b85393edfc15424ba5e922097af5,2024-06-26T00:15:11.293000 @@ -255188,6 +255223,8 @@ CVE-2024-5858,0,0,30241924d409355226bb80c4fb982c4833f84483f4f89b94e986f70fe7751e CVE-2024-5859,0,0,5b284a4381086ad6bad860c96074f61ed02c9601ee45c79362fb0f8a492df8fd,2024-06-24T19:21:07.943000 CVE-2024-5860,0,0,f855eee13286327286a851090329abd51f0ce228b863644ab8e1f7f80e1d731d,2024-06-20T12:44:01.637000 CVE-2024-5862,0,0,8a220661cafbb333e5e6ccd0618a6e1d05daa829a8bf612cc996a5557415f6ab,2024-06-24T19:26:47.037000 +CVE-2024-5863,1,1,5a844e6908bc4baedd1c1a08db9c8485c4b63d69e2ed1acace3737cdce4b462d,2024-06-28T10:27:00.920000 +CVE-2024-5864,1,1,8b8d87391d74668e6e2fee730839a4ab70ee9b4eed3251f512277f79f0902e59,2024-06-28T10:27:00.920000 CVE-2024-5868,0,0,cddb0a1baa550d897574c2505eb276b5cd69c2fd57d27d79dec0dad91553a572,2024-06-17T12:42:04.623000 CVE-2024-5871,0,0,83e6d3ea3d7363cdcbcb485d9161ada2b3d6bba887290fa58ab89820983d4022,2024-06-17T12:42:04.623000 CVE-2024-5873,0,0,4affe4b1f71505ca05298a33c7e23c3ae147869580237755bed2d180fbea1b8e,2024-06-12T08:15:51.550000 @@ -255207,7 +255244,9 @@ CVE-2024-5906,0,0,b7fc466b9931ce265a1ef81017e39098b5ad31bf494bc22103ede7f6c2cace CVE-2024-5907,0,0,17327a712757852c4b43c811f24252c9a6d5917388dc8b093882f86e14b7ae5b,2024-06-13T18:36:09.010000 CVE-2024-5908,0,0,626d4ee0c59c97ce53ee1de5871da8e08f754ec4c69aaf4477321803dc309ac6,2024-06-13T18:36:09.010000 CVE-2024-5909,0,0,135cc10869213a459dd71b8b5da7a5af9b37ed5f304a5a3bf425c78b00034c69,2024-06-13T18:36:09.010000 +CVE-2024-5922,1,1,e29cc1185c6dbfaaa56af47c566fc115571f883f702dae9a40d1739b93329831,2024-06-28T10:27:00.920000 CVE-2024-5924,0,0,c5c85908e1bc3136c78f0f5690507eea3ba6b330ba27c618aeeb0cde0122c6a0,2024-06-17T12:43:31.090000 +CVE-2024-5925,1,1,9927dea575613975cb1f3595ae91835696c41f49e37b56a7c3c9724b111ba81c,2024-06-28T10:27:00.920000 CVE-2024-5927,0,0,19c3cc8f6784d442d3026759cebf43551fd4d736175a291c91056bccb3b59092,2024-06-13T11:15:48.917000 CVE-2024-5933,0,0,43c62c8c7b78a3986e6c8a8e384c2c83973a07919e7ff71c58e74be82b63ae22,2024-06-27T19:25:12.067000 CVE-2024-5934,0,0,688a30e1a6237b69634d3ab7eb078a5b0fdbb09f93730eb6244fa568165f0ccc,2024-06-14T16:15:14.647000 @@ -255262,7 +255301,7 @@ CVE-2024-6045,0,0,2dcda6a0cbff8cd9e195f4d3ab65f0210762794017ec56ef72ed3655d46b17 CVE-2024-6046,0,0,91371f2b9afd0a654dc4dc6a88ac5fb04a186cb82713804dda3cac2d7733c344,2024-06-18T11:15:52.513000 CVE-2024-6047,0,0,4cdf0f1acff12373f8f857c8d442b9de2221d44745323cc3f60bf66bccd7a239,2024-06-17T14:15:13.040000 CVE-2024-6048,0,0,03e9485ef23720c113f11fed6c539200d9a1624e025ca24798cddf9d0c1a9e3b,2024-06-17T12:42:04.623000 -CVE-2024-6054,0,0,9f18323a2fbed2ef991deda5bef29ef43b30ded232406b18f163378de0779c3b,2024-06-27T12:47:19.847000 +CVE-2024-6054,0,1,dbd3e49036b5938301871d5a6c67ee17ba89370e3288082b00ca89a51a1f06ed,2024-06-28T13:11:58.810000 CVE-2024-6055,0,0,7490ef4c1367b62a13fc44ec964fb12263f9fa479e5bd4bbc3820296c19002e0,2024-06-20T12:44:22.977000 CVE-2024-6056,0,0,9210a6d5e69cda44c36495fe4964320c8f6a47f4e723a559827fc7a6d2ee595f,2024-06-20T12:44:22.977000 CVE-2024-6057,0,0,3fe0cc3f033e9735165b225d202aca1a708a694e0fe3a8863e85d03de2c16d7c,2024-06-20T12:44:22.977000 @@ -255276,7 +255315,7 @@ CVE-2024-6064,0,0,6c37569e777aad3e1a715d1d67e59381aa9d19e46235bcb0abd84ff598ca13 CVE-2024-6065,0,0,8dd99f4d37f301246412681f45228fac07d3ea15c1391b550b52738ce1d9d096,2024-06-20T12:44:01.637000 CVE-2024-6066,0,0,bdecbe263c05a4772a78f07626fc1e3f9d1817cac413c3ff735f168ece871a97,2024-06-20T12:44:01.637000 CVE-2024-6067,0,0,6728784af54ae6b64b1bb52b7887afb1ba68c7ac0e5f2ef2339910430d39d127,2024-06-20T12:44:01.637000 -CVE-2024-6071,1,1,8b5987b47eb857a98a5f2dc083dddecf445ed8b31f9f98d238f3c3f8917ce85c,2024-06-27T23:15:50.470000 +CVE-2024-6071,0,1,10e78c82267f57981fcc90e3e22358a5c4cb7401eca3480df2296481e008838c,2024-06-28T10:27:00.920000 CVE-2024-6080,0,0,280d37fb165500fef7817a0477b29efc9416c53bd245603eb247ad266e840146,2024-06-20T20:15:20.583000 CVE-2024-6082,0,0,fb01e1189e5a394e265b664904a3543325f650fe09e01ea1f771a4558bb8508b,2024-06-20T19:15:50.437000 CVE-2024-6083,0,0,7e7a5636ed7255d0fcfcd2ad673b2a41cb1a824617e25b4cc387230a5aebb333,2024-06-20T12:44:01.637000 @@ -255300,7 +255339,7 @@ CVE-2024-6115,0,0,3c5ab17ce7a1f33a2dee71d5335f67c2e99b7d6204dc28e4e10a70d6ca6b07 CVE-2024-6116,0,0,5843dd08daba10a4f1c43a634f4172ccf9c702c464ac49dc5f784b4aa5e3fcb5,2024-06-20T12:44:01.637000 CVE-2024-6120,0,0,5c59cd273da1e2ed6c553cf441ff0a5530e8c4d18132ff0e8595e05e3633cb46,2024-06-24T20:03:04.363000 CVE-2024-6125,0,0,85b92914638eb24a081146fd823c584c2333b183768ef26d618955e83646311b,2024-06-20T12:44:01.637000 -CVE-2024-6127,0,0,3bfd915883e8e529c210268307f8789ad51e7c78cbbe1d818eca744fd1989d40,2024-06-27T20:15:23.093000 +CVE-2024-6127,0,1,8f3f3591469382ebb006087ec5b5be799ca274948ebd71b090f997c1ae2c89a9,2024-06-28T10:27:00.920000 CVE-2024-6128,0,0,cd2531d89b3a76f4be34b5ead44f5b65458326ae9dfb5c97dcd0243e237eb5b3,2024-06-21T16:15:12.570000 CVE-2024-6129,0,0,dfa20fd20a0a3099fcdc2f66c56de27040819ee45bd7efe66cb95f894b77d645,2024-06-20T12:44:01.637000 CVE-2024-6132,0,0,c816ab5ddbf096dbfac6131f33b5d3d3e264dd5fbb695e6c347719e5920b43ca,2024-06-20T12:44:01.637000 @@ -255366,15 +255405,17 @@ CVE-2024-6277,0,0,82a7caef84f140d39367b293ce24c3b1ac7d5afca66e1b97bc6dda0940bca5 CVE-2024-6278,0,0,b7497a594f7128876befcfd03ef67851e16926a50d842e021e87a9cd67006c16,2024-06-24T14:15:13.293000 CVE-2024-6279,0,0,aff2444fd4ca8a3e713d1d2803a8314b319d4a725e3aef2a87ea3d2f62dd68bf,2024-06-26T20:15:17.003000 CVE-2024-6280,0,0,4e5bdd720fdc6d68a51312dcfd366ac88ed5daebd5ed348aefe6d5aa74c57712,2024-06-24T12:57:36.513000 -CVE-2024-6283,0,0,7679cdbc5a0795d424f817d9e78cc6434dd815448d811d36eaa84a53a985e5af,2024-06-27T12:47:19.847000 +CVE-2024-6283,0,1,84796e0660e5beb3ad885e74e117108f941d8d6090497e3b6867080b852b92df,2024-06-28T13:37:44.763000 CVE-2024-6285,0,0,e2996efda4e983a3551e96b4c79fe85947d0c5facb8b6e94cf5ae2183076f6f4,2024-06-26T14:24:38.113000 CVE-2024-6287,0,0,91ea920d50ec75aef59aca2b29908a9542c1a59d5111a1068e10d538d24873e6,2024-06-26T14:36:08.507000 +CVE-2024-6288,1,1,759e3147da1b3805ee22c246688b7816f816dcaacd990c0e2025b974262129c2,2024-06-28T10:27:00.920000 CVE-2024-6290,0,0,67d71c6eecc55d47dcb9d49fef6cb3eb904eb85c23231aa8b50f7ec84f4eca31,2024-06-27T03:15:51.093000 CVE-2024-6291,0,0,98316ec8c30ef04c26783c1255f68e3afa2f2d15a087f64e5f63af0c4c0b5b0c,2024-06-27T03:15:51.167000 CVE-2024-6292,0,0,e1c33fd19725688298e8cda180f12fd23244dcb77aa2334c1dbb13297cecfcc5,2024-06-27T03:15:51.230000 CVE-2024-6293,0,0,852bbc0bbb768d29d4d4dd718fa490ff1047406faeedc791fdc0eec18c787ee7,2024-06-27T03:15:51.293000 CVE-2024-6294,0,0,6e157447a380471b4e672432441b0d5dbba0fc67bea6ec1145ba68325fae735e,2024-06-25T12:24:17.873000 CVE-2024-6295,0,0,34be56c45a4536c17926fc9c9d678ef84cff2fe2a1e2b1e6898c4c1a47aa2e9c,2024-06-25T12:24:17.873000 +CVE-2024-6296,1,1,2f0e4a66c60611de0f983e9680e76a35c142eccc5d0956d3219c5a0abd09b7d4,2024-06-28T10:27:00.920000 CVE-2024-6297,0,0,4335adc3c6f03845409551a993bf84e337f4db092e95dafe9b538168f2fdbc65,2024-06-25T12:24:17.873000 CVE-2024-6299,0,0,ac4cc3be959136c111a6e6496906d360cd16590e9a56c52981ced1e389248607,2024-06-25T18:50:42.040000 CVE-2024-6300,0,0,ec8648b9a85313a0c3f6eb7f52e874de04a3c55f1d2e9864914ad1a09eaa76e2,2024-06-25T18:50:42.040000 @@ -255383,9 +255424,9 @@ CVE-2024-6302,0,0,00dbaed03abf2df4ba6afdc17b83aae29a67dccdb294bada18ebc7812a9c7f CVE-2024-6303,0,0,d0073d724a840fc51053c139c4c2a1d9edc1b884490e42056230d0eb11bdbc29,2024-06-25T18:50:42.040000 CVE-2024-6305,0,0,f99f0e2fe8305a118a77228b9078f8dc9ee1845d0c6e4aa828aaf18dadf3724c,2024-06-25T17:15:11.020000 CVE-2024-6306,0,0,711bff153bb36aca97259b9a58665f79686710d592de1aed3b99962d3c3067a2,2024-06-25T17:15:11.107000 -CVE-2024-6307,0,0,8ab5a431e062520bb1ad7f310d46410dbbde3d3f7608d294c115bc975c016c27,2024-06-25T12:24:17.873000 +CVE-2024-6307,0,1,a6037df0fa8617c9aaeffdc703000fa7423e885d439338f30eb38eb0279e87b9,2024-06-28T13:15:03.453000 CVE-2024-6308,0,0,483bab7c0040f40965fba497a0be9e45fef6974a263c54d39149185a218f4b43,2024-06-25T21:16:02.087000 -CVE-2024-6323,0,0,700f1a3366b819431f4d9e19f9e189cfc39e4c2b3586687b2317570c92195f74,2024-06-27T12:47:19.847000 +CVE-2024-6323,0,1,16f93962f537d8478d96317e8b0d9cad0e3aee225ed0ebdb8d6f6bf214bb804e,2024-06-28T13:15:19.317000 CVE-2024-6344,0,0,f8fe072181ab91a453822e0b523eb31f74817bc4efb68c7d2134a2d41a8e3557,2024-06-27T00:15:13.360000 CVE-2024-6349,0,0,f01d61e3475192c945ec3639c2eda3b231a23d2f279c2f15b4719385fb2bd065,2024-06-26T15:15:20.690000 CVE-2024-6354,0,0,b70a2915a44ee7e7e6c00925c9a92ab9e6b070beaff28ea6d89d1a4dcb2a10e6,2024-06-27T12:47:19.847000