diff --git a/CVE-2011/CVE-2011-30xx/CVE-2011-3062.json b/CVE-2011/CVE-2011-30xx/CVE-2011-3062.json index f2218bbbb1b..a30646834e8 100644 --- a/CVE-2011/CVE-2011-30xx/CVE-2011-3062.json +++ b/CVE-2011/CVE-2011-30xx/CVE-2011-3062.json @@ -2,7 +2,7 @@ "id": "CVE-2011-3062", "sourceIdentifier": "cve@mitre.org", "published": "2012-03-30T22:55:01.637", - "lastModified": "2020-04-14T15:12:58.080", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -80,14 +80,14 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", - "versionEndExcluding": "12.0", - "matchCriteriaId": "C5BD15C4-E072-4A61-A8E3-661C7CDDA61F" + "versionEndExcluding": "10.0.4", + "matchCriteriaId": "6B56518C-CC64-4D32-9295-34D5F1B8388F" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", - "versionEndExcluding": "10.0.4", - "matchCriteriaId": "7F854E56-E8CD-499B-85E2-A3793BB8FA93" + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", + "versionEndExcluding": "12.0", + "matchCriteriaId": "C5BD15C4-E072-4A61-A8E3-661C7CDDA61F" }, { "vulnerable": true, diff --git a/CVE-2012/CVE-2012-04xx/CVE-2012-0441.json b/CVE-2012/CVE-2012-04xx/CVE-2012-0441.json index fc8e01b7ecf..bd692a94d30 100644 --- a/CVE-2012/CVE-2012-04xx/CVE-2012-0441.json +++ b/CVE-2012/CVE-2012-04xx/CVE-2012-0441.json @@ -2,7 +2,7 @@ "id": "CVE-2012-0441", "sourceIdentifier": "cve@mitre.org", "published": "2012-06-05T23:55:01.403", - "lastModified": "2018-01-18T02:29:03.600", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -201,6 +201,16 @@ "criteria": "cpe:2.3:a:mozilla:firefox:10.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "FDFC5947-3C3D-4484-8803-D6629C63B315" }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.3:*:*:*:*:*:*:*", + "matchCriteriaId": "A04BF0E2-0A40-4396-A46A-005D103D9E3F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.4:*:*:*:*:*:*:*", + "matchCriteriaId": "C0C4C930-6EC1-469D-811C-E85490AB38C3" + }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox:11.0:*:*:*:*:*:*:*", @@ -216,31 +226,6 @@ "criteria": "cpe:2.3:a:mozilla:firefox:12.0:beta6:*:*:*:*:*:*", "matchCriteriaId": "AB630A94-DA1F-4A7F-891D-E6F242C20271" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0:*:*:*:*:*:*:*", - "matchCriteriaId": "FB867E19-9678-4BC2-A0C6-1D5E1A420637" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "FDA03C94-CA08-4D5A-9D96-551A5D4892B9" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "24BA1727-264B-4E53-874D-A5DAFE275922" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.3:*:*:*:*:*:*:*", - "matchCriteriaId": "B2F499D8-F2FB-4AE9-8464-88717C5213D6" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.4:*:*:*:*:*:*:*", - "matchCriteriaId": "7DFCA446-F247-45B8-BE02-A006FA9EAF8C" - }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:*", diff --git a/CVE-2012/CVE-2012-04xx/CVE-2012-0451.json b/CVE-2012/CVE-2012-04xx/CVE-2012-0451.json index 0f9cbf25290..471a714e436 100644 --- a/CVE-2012/CVE-2012-04xx/CVE-2012-0451.json +++ b/CVE-2012/CVE-2012-04xx/CVE-2012-0451.json @@ -2,7 +2,7 @@ "id": "CVE-2012-0451", "sourceIdentifier": "cve@mitre.org", "published": "2012-03-14T19:55:01.600", - "lastModified": "2018-01-18T02:29:03.770", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -198,8 +198,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0:*:*:*:*:*:*:*", - "matchCriteriaId": "FB867E19-9678-4BC2-A0C6-1D5E1A420637" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0:*:*:*:*:*:*:*", + "matchCriteriaId": "A1D4D8C9-5A00-46FE-9E42-CB8C2D66B120" }, { "vulnerable": true, diff --git a/CVE-2012/CVE-2012-04xx/CVE-2012-0454.json b/CVE-2012/CVE-2012-04xx/CVE-2012-0454.json index 91e4fb869c4..15e6476b898 100644 --- a/CVE-2012/CVE-2012-04xx/CVE-2012-0454.json +++ b/CVE-2012/CVE-2012-04xx/CVE-2012-0454.json @@ -2,7 +2,7 @@ "id": "CVE-2012-0454", "sourceIdentifier": "cve@mitre.org", "published": "2012-03-14T19:55:01.710", - "lastModified": "2018-10-30T16:27:21.030", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -211,8 +211,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0:*:*:*:*:*:*:*", - "matchCriteriaId": "FB867E19-9678-4BC2-A0C6-1D5E1A420637" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0:*:*:*:*:*:*:*", + "matchCriteriaId": "A1D4D8C9-5A00-46FE-9E42-CB8C2D66B120" }, { "vulnerable": true, diff --git a/CVE-2012/CVE-2012-04xx/CVE-2012-0455.json b/CVE-2012/CVE-2012-04xx/CVE-2012-0455.json index d7529364fe2..9bac624b40f 100644 --- a/CVE-2012/CVE-2012-04xx/CVE-2012-0455.json +++ b/CVE-2012/CVE-2012-04xx/CVE-2012-0455.json @@ -2,7 +2,7 @@ "id": "CVE-2012-0455", "sourceIdentifier": "cve@mitre.org", "published": "2012-03-14T19:55:01.837", - "lastModified": "2018-01-18T02:29:04.207", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -214,8 +214,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0:*:*:*:*:*:*:*", - "matchCriteriaId": "FB867E19-9678-4BC2-A0C6-1D5E1A420637" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0:*:*:*:*:*:*:*", + "matchCriteriaId": "A1D4D8C9-5A00-46FE-9E42-CB8C2D66B120" }, { "vulnerable": true, diff --git a/CVE-2012/CVE-2012-04xx/CVE-2012-0456.json b/CVE-2012/CVE-2012-04xx/CVE-2012-0456.json index 477085af171..d304a6dca79 100644 --- a/CVE-2012/CVE-2012-04xx/CVE-2012-0456.json +++ b/CVE-2012/CVE-2012-04xx/CVE-2012-0456.json @@ -2,7 +2,7 @@ "id": "CVE-2012-0456", "sourceIdentifier": "cve@mitre.org", "published": "2012-03-14T19:55:01.943", - "lastModified": "2018-01-18T02:29:04.397", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -96,18 +96,18 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0:*:*:*:*:*:*:*", - "matchCriteriaId": "FB867E19-9678-4BC2-A0C6-1D5E1A420637" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0:*:*:*:*:*:*:*", + "matchCriteriaId": "A1D4D8C9-5A00-46FE-9E42-CB8C2D66B120" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "FDA03C94-CA08-4D5A-9D96-551A5D4892B9" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "E639BCCB-A6BF-4174-BFAF-9674E65BA404" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "24BA1727-264B-4E53-874D-A5DAFE275922" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "FDFC5947-3C3D-4484-8803-D6629C63B315" } ] } diff --git a/CVE-2012/CVE-2012-04xx/CVE-2012-0457.json b/CVE-2012/CVE-2012-04xx/CVE-2012-0457.json index c4a73a7c999..755bf9c1a6f 100644 --- a/CVE-2012/CVE-2012-04xx/CVE-2012-0457.json +++ b/CVE-2012/CVE-2012-04xx/CVE-2012-0457.json @@ -2,7 +2,7 @@ "id": "CVE-2012-0457", "sourceIdentifier": "cve@mitre.org", "published": "2012-03-14T19:55:01.990", - "lastModified": "2018-01-18T02:29:04.567", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -96,18 +96,18 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0:*:*:*:*:*:*:*", - "matchCriteriaId": "FB867E19-9678-4BC2-A0C6-1D5E1A420637" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0:*:*:*:*:*:*:*", + "matchCriteriaId": "A1D4D8C9-5A00-46FE-9E42-CB8C2D66B120" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "FDA03C94-CA08-4D5A-9D96-551A5D4892B9" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "E639BCCB-A6BF-4174-BFAF-9674E65BA404" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "24BA1727-264B-4E53-874D-A5DAFE275922" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "FDFC5947-3C3D-4484-8803-D6629C63B315" } ] } diff --git a/CVE-2012/CVE-2012-04xx/CVE-2012-0458.json b/CVE-2012/CVE-2012-04xx/CVE-2012-0458.json index b5da1e4c458..95e3bca651c 100644 --- a/CVE-2012/CVE-2012-04xx/CVE-2012-0458.json +++ b/CVE-2012/CVE-2012-04xx/CVE-2012-0458.json @@ -2,7 +2,7 @@ "id": "CVE-2012-0458", "sourceIdentifier": "cve@mitre.org", "published": "2012-03-14T19:55:02.037", - "lastModified": "2018-01-18T02:29:04.770", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -96,18 +96,18 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0:*:*:*:*:*:*:*", - "matchCriteriaId": "FB867E19-9678-4BC2-A0C6-1D5E1A420637" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0:*:*:*:*:*:*:*", + "matchCriteriaId": "A1D4D8C9-5A00-46FE-9E42-CB8C2D66B120" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "FDA03C94-CA08-4D5A-9D96-551A5D4892B9" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "E639BCCB-A6BF-4174-BFAF-9674E65BA404" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "24BA1727-264B-4E53-874D-A5DAFE275922" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "FDFC5947-3C3D-4484-8803-D6629C63B315" } ] } diff --git a/CVE-2012/CVE-2012-04xx/CVE-2012-0459.json b/CVE-2012/CVE-2012-04xx/CVE-2012-0459.json index d2a03cec111..f14e11ce2bb 100644 --- a/CVE-2012/CVE-2012-04xx/CVE-2012-0459.json +++ b/CVE-2012/CVE-2012-04xx/CVE-2012-0459.json @@ -2,7 +2,7 @@ "id": "CVE-2012-0459", "sourceIdentifier": "cve@mitre.org", "published": "2012-03-14T19:55:02.100", - "lastModified": "2018-01-18T02:29:05.007", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -198,8 +198,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0:*:*:*:*:*:*:*", - "matchCriteriaId": "FB867E19-9678-4BC2-A0C6-1D5E1A420637" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0:*:*:*:*:*:*:*", + "matchCriteriaId": "A1D4D8C9-5A00-46FE-9E42-CB8C2D66B120" }, { "vulnerable": true, diff --git a/CVE-2012/CVE-2012-04xx/CVE-2012-0460.json b/CVE-2012/CVE-2012-04xx/CVE-2012-0460.json index f36cee56f2a..592fe428536 100644 --- a/CVE-2012/CVE-2012-04xx/CVE-2012-0460.json +++ b/CVE-2012/CVE-2012-04xx/CVE-2012-0460.json @@ -2,7 +2,7 @@ "id": "CVE-2012-0460", "sourceIdentifier": "cve@mitre.org", "published": "2012-03-14T19:55:02.147", - "lastModified": "2018-01-18T02:29:05.177", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -198,8 +198,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0:*:*:*:*:*:*:*", - "matchCriteriaId": "FB867E19-9678-4BC2-A0C6-1D5E1A420637" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0:*:*:*:*:*:*:*", + "matchCriteriaId": "A1D4D8C9-5A00-46FE-9E42-CB8C2D66B120" }, { "vulnerable": true, diff --git a/CVE-2012/CVE-2012-04xx/CVE-2012-0461.json b/CVE-2012/CVE-2012-04xx/CVE-2012-0461.json index 43c3702afd5..37b91792e4a 100644 --- a/CVE-2012/CVE-2012-04xx/CVE-2012-0461.json +++ b/CVE-2012/CVE-2012-04xx/CVE-2012-0461.json @@ -2,7 +2,7 @@ "id": "CVE-2012-0461", "sourceIdentifier": "cve@mitre.org", "published": "2012-03-14T19:55:02.193", - "lastModified": "2018-01-18T02:29:05.380", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -96,18 +96,18 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0:*:*:*:*:*:*:*", - "matchCriteriaId": "FB867E19-9678-4BC2-A0C6-1D5E1A420637" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0:*:*:*:*:*:*:*", + "matchCriteriaId": "A1D4D8C9-5A00-46FE-9E42-CB8C2D66B120" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "FDA03C94-CA08-4D5A-9D96-551A5D4892B9" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "E639BCCB-A6BF-4174-BFAF-9674E65BA404" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "24BA1727-264B-4E53-874D-A5DAFE275922" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "FDFC5947-3C3D-4484-8803-D6629C63B315" } ] } diff --git a/CVE-2012/CVE-2012-04xx/CVE-2012-0462.json b/CVE-2012/CVE-2012-04xx/CVE-2012-0462.json index fc18d3a5c6e..ceca7c2d711 100644 --- a/CVE-2012/CVE-2012-04xx/CVE-2012-0462.json +++ b/CVE-2012/CVE-2012-04xx/CVE-2012-0462.json @@ -2,7 +2,7 @@ "id": "CVE-2012-0462", "sourceIdentifier": "cve@mitre.org", "published": "2012-03-14T19:55:02.240", - "lastModified": "2018-01-18T02:29:05.567", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -198,8 +198,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0:*:*:*:*:*:*:*", - "matchCriteriaId": "FB867E19-9678-4BC2-A0C6-1D5E1A420637" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0:*:*:*:*:*:*:*", + "matchCriteriaId": "A1D4D8C9-5A00-46FE-9E42-CB8C2D66B120" }, { "vulnerable": true, diff --git a/CVE-2012/CVE-2012-04xx/CVE-2012-0463.json b/CVE-2012/CVE-2012-04xx/CVE-2012-0463.json index e83597541af..45f940e3a41 100644 --- a/CVE-2012/CVE-2012-04xx/CVE-2012-0463.json +++ b/CVE-2012/CVE-2012-04xx/CVE-2012-0463.json @@ -2,7 +2,7 @@ "id": "CVE-2012-0463", "sourceIdentifier": "cve@mitre.org", "published": "2012-03-14T19:55:02.287", - "lastModified": "2018-01-11T02:29:03.077", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -96,18 +96,18 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0:*:*:*:*:*:*:*", - "matchCriteriaId": "FB867E19-9678-4BC2-A0C6-1D5E1A420637" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0:*:*:*:*:*:*:*", + "matchCriteriaId": "A1D4D8C9-5A00-46FE-9E42-CB8C2D66B120" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "FDA03C94-CA08-4D5A-9D96-551A5D4892B9" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "E639BCCB-A6BF-4174-BFAF-9674E65BA404" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "24BA1727-264B-4E53-874D-A5DAFE275922" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "FDFC5947-3C3D-4484-8803-D6629C63B315" } ] } diff --git a/CVE-2012/CVE-2012-04xx/CVE-2012-0464.json b/CVE-2012/CVE-2012-04xx/CVE-2012-0464.json index 5645ff7f897..572eec1b3c7 100644 --- a/CVE-2012/CVE-2012-04xx/CVE-2012-0464.json +++ b/CVE-2012/CVE-2012-04xx/CVE-2012-0464.json @@ -2,7 +2,7 @@ "id": "CVE-2012-0464", "sourceIdentifier": "cve@mitre.org", "published": "2012-03-14T19:55:02.337", - "lastModified": "2018-01-18T02:29:05.757", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -96,18 +96,18 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0:*:*:*:*:*:*:*", - "matchCriteriaId": "FB867E19-9678-4BC2-A0C6-1D5E1A420637" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0:*:*:*:*:*:*:*", + "matchCriteriaId": "A1D4D8C9-5A00-46FE-9E42-CB8C2D66B120" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "FDA03C94-CA08-4D5A-9D96-551A5D4892B9" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "E639BCCB-A6BF-4174-BFAF-9674E65BA404" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "24BA1727-264B-4E53-874D-A5DAFE275922" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "FDFC5947-3C3D-4484-8803-D6629C63B315" } ] } diff --git a/CVE-2012/CVE-2012-04xx/CVE-2012-0467.json b/CVE-2012/CVE-2012-04xx/CVE-2012-0467.json index a25d9ba6360..3dcd0c5f870 100644 --- a/CVE-2012/CVE-2012-04xx/CVE-2012-0467.json +++ b/CVE-2012/CVE-2012-04xx/CVE-2012-0467.json @@ -2,7 +2,7 @@ "id": "CVE-2012-0467", "sourceIdentifier": "cve@mitre.org", "published": "2012-04-25T10:10:17.150", - "lastModified": "2018-01-18T02:29:06.007", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -218,23 +218,23 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0:*:*:*:*:*:*:*", - "matchCriteriaId": "FB867E19-9678-4BC2-A0C6-1D5E1A420637" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0:*:*:*:*:*:*:*", + "matchCriteriaId": "A1D4D8C9-5A00-46FE-9E42-CB8C2D66B120" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "FDA03C94-CA08-4D5A-9D96-551A5D4892B9" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "E639BCCB-A6BF-4174-BFAF-9674E65BA404" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "24BA1727-264B-4E53-874D-A5DAFE275922" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "FDFC5947-3C3D-4484-8803-D6629C63B315" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.3:*:*:*:*:*:*:*", - "matchCriteriaId": "B2F499D8-F2FB-4AE9-8464-88717C5213D6" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.3:*:*:*:*:*:*:*", + "matchCriteriaId": "A04BF0E2-0A40-4396-A46A-005D103D9E3F" } ] } diff --git a/CVE-2012/CVE-2012-04xx/CVE-2012-0469.json b/CVE-2012/CVE-2012-04xx/CVE-2012-0469.json index dc08a999428..814c9381e15 100644 --- a/CVE-2012/CVE-2012-04xx/CVE-2012-0469.json +++ b/CVE-2012/CVE-2012-04xx/CVE-2012-0469.json @@ -2,7 +2,7 @@ "id": "CVE-2012-0469", "sourceIdentifier": "cve@mitre.org", "published": "2012-04-25T10:10:17.433", - "lastModified": "2017-12-29T02:29:07.360", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -218,23 +218,23 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0:*:*:*:*:*:*:*", - "matchCriteriaId": "FB867E19-9678-4BC2-A0C6-1D5E1A420637" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0:*:*:*:*:*:*:*", + "matchCriteriaId": "A1D4D8C9-5A00-46FE-9E42-CB8C2D66B120" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "FDA03C94-CA08-4D5A-9D96-551A5D4892B9" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "E639BCCB-A6BF-4174-BFAF-9674E65BA404" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "24BA1727-264B-4E53-874D-A5DAFE275922" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "FDFC5947-3C3D-4484-8803-D6629C63B315" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.3:*:*:*:*:*:*:*", - "matchCriteriaId": "B2F499D8-F2FB-4AE9-8464-88717C5213D6" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.3:*:*:*:*:*:*:*", + "matchCriteriaId": "A04BF0E2-0A40-4396-A46A-005D103D9E3F" } ] } diff --git a/CVE-2012/CVE-2012-04xx/CVE-2012-0470.json b/CVE-2012/CVE-2012-04xx/CVE-2012-0470.json index 8da87d3df2b..c66cda396e0 100644 --- a/CVE-2012/CVE-2012-04xx/CVE-2012-0470.json +++ b/CVE-2012/CVE-2012-04xx/CVE-2012-0470.json @@ -2,7 +2,7 @@ "id": "CVE-2012-0470", "sourceIdentifier": "cve@mitre.org", "published": "2012-04-25T10:10:17.480", - "lastModified": "2018-01-18T02:29:06.177", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -218,23 +218,23 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0:*:*:*:*:*:*:*", - "matchCriteriaId": "FB867E19-9678-4BC2-A0C6-1D5E1A420637" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0:*:*:*:*:*:*:*", + "matchCriteriaId": "A1D4D8C9-5A00-46FE-9E42-CB8C2D66B120" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "FDA03C94-CA08-4D5A-9D96-551A5D4892B9" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "E639BCCB-A6BF-4174-BFAF-9674E65BA404" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "24BA1727-264B-4E53-874D-A5DAFE275922" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "FDFC5947-3C3D-4484-8803-D6629C63B315" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.3:*:*:*:*:*:*:*", - "matchCriteriaId": "B2F499D8-F2FB-4AE9-8464-88717C5213D6" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.3:*:*:*:*:*:*:*", + "matchCriteriaId": "A04BF0E2-0A40-4396-A46A-005D103D9E3F" } ] } diff --git a/CVE-2012/CVE-2012-04xx/CVE-2012-0471.json b/CVE-2012/CVE-2012-04xx/CVE-2012-0471.json index fd96390414e..190f81a287e 100644 --- a/CVE-2012/CVE-2012-04xx/CVE-2012-0471.json +++ b/CVE-2012/CVE-2012-04xx/CVE-2012-0471.json @@ -2,7 +2,7 @@ "id": "CVE-2012-0471", "sourceIdentifier": "cve@mitre.org", "published": "2012-04-25T10:10:17.510", - "lastModified": "2018-01-18T02:29:06.350", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -218,23 +218,23 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0:*:*:*:*:*:*:*", - "matchCriteriaId": "FB867E19-9678-4BC2-A0C6-1D5E1A420637" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0:*:*:*:*:*:*:*", + "matchCriteriaId": "A1D4D8C9-5A00-46FE-9E42-CB8C2D66B120" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "FDA03C94-CA08-4D5A-9D96-551A5D4892B9" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "E639BCCB-A6BF-4174-BFAF-9674E65BA404" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "24BA1727-264B-4E53-874D-A5DAFE275922" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "FDFC5947-3C3D-4484-8803-D6629C63B315" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.3:*:*:*:*:*:*:*", - "matchCriteriaId": "B2F499D8-F2FB-4AE9-8464-88717C5213D6" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.3:*:*:*:*:*:*:*", + "matchCriteriaId": "A04BF0E2-0A40-4396-A46A-005D103D9E3F" } ] } diff --git a/CVE-2012/CVE-2012-04xx/CVE-2012-0472.json b/CVE-2012/CVE-2012-04xx/CVE-2012-0472.json index b5cfaa854dc..a83fad21f09 100644 --- a/CVE-2012/CVE-2012-04xx/CVE-2012-0472.json +++ b/CVE-2012/CVE-2012-04xx/CVE-2012-0472.json @@ -2,7 +2,7 @@ "id": "CVE-2012-0472", "sourceIdentifier": "cve@mitre.org", "published": "2012-04-25T10:10:17.557", - "lastModified": "2017-12-29T02:29:07.753", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -213,23 +213,23 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0:*:*:*:*:*:*:*", - "matchCriteriaId": "FB867E19-9678-4BC2-A0C6-1D5E1A420637" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0:*:*:*:*:*:*:*", + "matchCriteriaId": "A1D4D8C9-5A00-46FE-9E42-CB8C2D66B120" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "FDA03C94-CA08-4D5A-9D96-551A5D4892B9" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "E639BCCB-A6BF-4174-BFAF-9674E65BA404" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "24BA1727-264B-4E53-874D-A5DAFE275922" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "FDFC5947-3C3D-4484-8803-D6629C63B315" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.3:*:*:*:*:*:*:*", - "matchCriteriaId": "B2F499D8-F2FB-4AE9-8464-88717C5213D6" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.3:*:*:*:*:*:*:*", + "matchCriteriaId": "A04BF0E2-0A40-4396-A46A-005D103D9E3F" } ] } diff --git a/CVE-2012/CVE-2012-04xx/CVE-2012-0473.json b/CVE-2012/CVE-2012-04xx/CVE-2012-0473.json index fe44244c7d0..e54f8367aa1 100644 --- a/CVE-2012/CVE-2012-04xx/CVE-2012-0473.json +++ b/CVE-2012/CVE-2012-04xx/CVE-2012-0473.json @@ -2,7 +2,7 @@ "id": "CVE-2012-0473", "sourceIdentifier": "cve@mitre.org", "published": "2012-04-25T10:10:17.607", - "lastModified": "2017-12-29T02:29:07.893", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -218,23 +218,23 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0:*:*:*:*:*:*:*", - "matchCriteriaId": "FB867E19-9678-4BC2-A0C6-1D5E1A420637" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0:*:*:*:*:*:*:*", + "matchCriteriaId": "A1D4D8C9-5A00-46FE-9E42-CB8C2D66B120" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "FDA03C94-CA08-4D5A-9D96-551A5D4892B9" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "E639BCCB-A6BF-4174-BFAF-9674E65BA404" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "24BA1727-264B-4E53-874D-A5DAFE275922" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "FDFC5947-3C3D-4484-8803-D6629C63B315" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.3:*:*:*:*:*:*:*", - "matchCriteriaId": "B2F499D8-F2FB-4AE9-8464-88717C5213D6" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.3:*:*:*:*:*:*:*", + "matchCriteriaId": "A04BF0E2-0A40-4396-A46A-005D103D9E3F" } ] } diff --git a/CVE-2012/CVE-2012-04xx/CVE-2012-0474.json b/CVE-2012/CVE-2012-04xx/CVE-2012-0474.json index 820f06a0429..87962cd4760 100644 --- a/CVE-2012/CVE-2012-04xx/CVE-2012-0474.json +++ b/CVE-2012/CVE-2012-04xx/CVE-2012-0474.json @@ -2,7 +2,7 @@ "id": "CVE-2012-0474", "sourceIdentifier": "cve@mitre.org", "published": "2012-04-25T10:10:17.637", - "lastModified": "2017-12-29T02:29:08.003", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -218,23 +218,23 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0:*:*:*:*:*:*:*", - "matchCriteriaId": "FB867E19-9678-4BC2-A0C6-1D5E1A420637" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0:*:*:*:*:*:*:*", + "matchCriteriaId": "A1D4D8C9-5A00-46FE-9E42-CB8C2D66B120" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "FDA03C94-CA08-4D5A-9D96-551A5D4892B9" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "E639BCCB-A6BF-4174-BFAF-9674E65BA404" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "24BA1727-264B-4E53-874D-A5DAFE275922" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "FDFC5947-3C3D-4484-8803-D6629C63B315" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.3:*:*:*:*:*:*:*", - "matchCriteriaId": "B2F499D8-F2FB-4AE9-8464-88717C5213D6" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.3:*:*:*:*:*:*:*", + "matchCriteriaId": "A04BF0E2-0A40-4396-A46A-005D103D9E3F" } ] } diff --git a/CVE-2012/CVE-2012-04xx/CVE-2012-0477.json b/CVE-2012/CVE-2012-04xx/CVE-2012-0477.json index 3249b70c061..65323aa7ccd 100644 --- a/CVE-2012/CVE-2012-04xx/CVE-2012-0477.json +++ b/CVE-2012/CVE-2012-04xx/CVE-2012-0477.json @@ -2,7 +2,7 @@ "id": "CVE-2012-0477", "sourceIdentifier": "cve@mitre.org", "published": "2012-04-25T10:10:17.713", - "lastModified": "2018-01-18T02:29:06.537", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -218,23 +218,23 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0:*:*:*:*:*:*:*", - "matchCriteriaId": "FB867E19-9678-4BC2-A0C6-1D5E1A420637" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0:*:*:*:*:*:*:*", + "matchCriteriaId": "A1D4D8C9-5A00-46FE-9E42-CB8C2D66B120" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "FDA03C94-CA08-4D5A-9D96-551A5D4892B9" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "E639BCCB-A6BF-4174-BFAF-9674E65BA404" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "24BA1727-264B-4E53-874D-A5DAFE275922" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "FDFC5947-3C3D-4484-8803-D6629C63B315" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.3:*:*:*:*:*:*:*", - "matchCriteriaId": "B2F499D8-F2FB-4AE9-8464-88717C5213D6" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.3:*:*:*:*:*:*:*", + "matchCriteriaId": "A04BF0E2-0A40-4396-A46A-005D103D9E3F" } ] } diff --git a/CVE-2012/CVE-2012-04xx/CVE-2012-0478.json b/CVE-2012/CVE-2012-04xx/CVE-2012-0478.json index 2aba5af3027..aae82c7f9a9 100644 --- a/CVE-2012/CVE-2012-04xx/CVE-2012-0478.json +++ b/CVE-2012/CVE-2012-04xx/CVE-2012-0478.json @@ -2,7 +2,7 @@ "id": "CVE-2012-0478", "sourceIdentifier": "cve@mitre.org", "published": "2012-04-25T10:10:17.760", - "lastModified": "2017-12-29T02:29:08.267", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -218,23 +218,23 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0:*:*:*:*:*:*:*", - "matchCriteriaId": "FB867E19-9678-4BC2-A0C6-1D5E1A420637" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0:*:*:*:*:*:*:*", + "matchCriteriaId": "A1D4D8C9-5A00-46FE-9E42-CB8C2D66B120" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "FDA03C94-CA08-4D5A-9D96-551A5D4892B9" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "E639BCCB-A6BF-4174-BFAF-9674E65BA404" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "24BA1727-264B-4E53-874D-A5DAFE275922" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "FDFC5947-3C3D-4484-8803-D6629C63B315" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.3:*:*:*:*:*:*:*", - "matchCriteriaId": "B2F499D8-F2FB-4AE9-8464-88717C5213D6" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.3:*:*:*:*:*:*:*", + "matchCriteriaId": "A04BF0E2-0A40-4396-A46A-005D103D9E3F" } ] } diff --git a/CVE-2012/CVE-2012-04xx/CVE-2012-0479.json b/CVE-2012/CVE-2012-04xx/CVE-2012-0479.json index 95ba04fecbc..9e4ce9a14aa 100644 --- a/CVE-2012/CVE-2012-04xx/CVE-2012-0479.json +++ b/CVE-2012/CVE-2012-04xx/CVE-2012-0479.json @@ -2,7 +2,7 @@ "id": "CVE-2012-0479", "sourceIdentifier": "cve@mitre.org", "published": "2012-04-25T10:10:17.793", - "lastModified": "2018-01-18T02:29:06.757", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -218,23 +218,23 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0:*:*:*:*:*:*:*", - "matchCriteriaId": "FB867E19-9678-4BC2-A0C6-1D5E1A420637" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0:*:*:*:*:*:*:*", + "matchCriteriaId": "A1D4D8C9-5A00-46FE-9E42-CB8C2D66B120" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "FDA03C94-CA08-4D5A-9D96-551A5D4892B9" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "E639BCCB-A6BF-4174-BFAF-9674E65BA404" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "24BA1727-264B-4E53-874D-A5DAFE275922" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "FDFC5947-3C3D-4484-8803-D6629C63B315" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.3:*:*:*:*:*:*:*", - "matchCriteriaId": "B2F499D8-F2FB-4AE9-8464-88717C5213D6" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.3:*:*:*:*:*:*:*", + "matchCriteriaId": "A04BF0E2-0A40-4396-A46A-005D103D9E3F" } ] } diff --git a/CVE-2012/CVE-2012-19xx/CVE-2012-1937.json b/CVE-2012/CVE-2012-19xx/CVE-2012-1937.json index 6060112ba89..4cdde0ea6d8 100644 --- a/CVE-2012/CVE-2012-19xx/CVE-2012-1937.json +++ b/CVE-2012/CVE-2012-19xx/CVE-2012-1937.json @@ -2,7 +2,7 @@ "id": "CVE-2012-1937", "sourceIdentifier": "cve@mitre.org", "published": "2012-06-05T23:55:01.467", - "lastModified": "2018-01-05T02:29:30.180", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -201,6 +201,16 @@ "criteria": "cpe:2.3:a:mozilla:firefox:10.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "FDFC5947-3C3D-4484-8803-D6629C63B315" }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.3:*:*:*:*:*:*:*", + "matchCriteriaId": "A04BF0E2-0A40-4396-A46A-005D103D9E3F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.4:*:*:*:*:*:*:*", + "matchCriteriaId": "C0C4C930-6EC1-469D-811C-E85490AB38C3" + }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox:11.0:*:*:*:*:*:*:*", @@ -216,31 +226,6 @@ "criteria": "cpe:2.3:a:mozilla:firefox:12.0:beta6:*:*:*:*:*:*", "matchCriteriaId": "AB630A94-DA1F-4A7F-891D-E6F242C20271" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0:*:*:*:*:*:*:*", - "matchCriteriaId": "FB867E19-9678-4BC2-A0C6-1D5E1A420637" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "FDA03C94-CA08-4D5A-9D96-551A5D4892B9" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "24BA1727-264B-4E53-874D-A5DAFE275922" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.3:*:*:*:*:*:*:*", - "matchCriteriaId": "B2F499D8-F2FB-4AE9-8464-88717C5213D6" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.4:*:*:*:*:*:*:*", - "matchCriteriaId": "7DFCA446-F247-45B8-BE02-A006FA9EAF8C" - }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*", diff --git a/CVE-2012/CVE-2012-19xx/CVE-2012-1939.json b/CVE-2012/CVE-2012-19xx/CVE-2012-1939.json index fd1eb80cb32..83691d93f31 100644 --- a/CVE-2012/CVE-2012-19xx/CVE-2012-1939.json +++ b/CVE-2012/CVE-2012-19xx/CVE-2012-1939.json @@ -2,7 +2,7 @@ "id": "CVE-2012-1939", "sourceIdentifier": "cve@mitre.org", "published": "2012-06-05T23:55:01.560", - "lastModified": "2017-12-29T02:29:14.597", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -63,28 +63,28 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0:*:*:*:*:*:*:*", - "matchCriteriaId": "FB867E19-9678-4BC2-A0C6-1D5E1A420637" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0:*:*:*:*:*:*:*", + "matchCriteriaId": "A1D4D8C9-5A00-46FE-9E42-CB8C2D66B120" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "FDA03C94-CA08-4D5A-9D96-551A5D4892B9" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "E639BCCB-A6BF-4174-BFAF-9674E65BA404" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "24BA1727-264B-4E53-874D-A5DAFE275922" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "FDFC5947-3C3D-4484-8803-D6629C63B315" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.3:*:*:*:*:*:*:*", - "matchCriteriaId": "B2F499D8-F2FB-4AE9-8464-88717C5213D6" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.3:*:*:*:*:*:*:*", + "matchCriteriaId": "A04BF0E2-0A40-4396-A46A-005D103D9E3F" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.4:*:*:*:*:*:*:*", - "matchCriteriaId": "7DFCA446-F247-45B8-BE02-A006FA9EAF8C" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.4:*:*:*:*:*:*:*", + "matchCriteriaId": "C0C4C930-6EC1-469D-811C-E85490AB38C3" } ] } diff --git a/CVE-2012/CVE-2012-19xx/CVE-2012-1940.json b/CVE-2012/CVE-2012-19xx/CVE-2012-1940.json index 67d32f93c7f..0e45ab55298 100644 --- a/CVE-2012/CVE-2012-19xx/CVE-2012-1940.json +++ b/CVE-2012/CVE-2012-19xx/CVE-2012-1940.json @@ -2,7 +2,7 @@ "id": "CVE-2012-1940", "sourceIdentifier": "cve@mitre.org", "published": "2012-06-05T23:55:01.607", - "lastModified": "2018-01-05T02:29:30.290", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -201,6 +201,16 @@ "criteria": "cpe:2.3:a:mozilla:firefox:10.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "FDFC5947-3C3D-4484-8803-D6629C63B315" }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.3:*:*:*:*:*:*:*", + "matchCriteriaId": "A04BF0E2-0A40-4396-A46A-005D103D9E3F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.4:*:*:*:*:*:*:*", + "matchCriteriaId": "C0C4C930-6EC1-469D-811C-E85490AB38C3" + }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox:11.0:*:*:*:*:*:*:*", @@ -216,31 +226,6 @@ "criteria": "cpe:2.3:a:mozilla:firefox:12.0:beta6:*:*:*:*:*:*", "matchCriteriaId": "AB630A94-DA1F-4A7F-891D-E6F242C20271" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0:*:*:*:*:*:*:*", - "matchCriteriaId": "FB867E19-9678-4BC2-A0C6-1D5E1A420637" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "FDA03C94-CA08-4D5A-9D96-551A5D4892B9" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "24BA1727-264B-4E53-874D-A5DAFE275922" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.3:*:*:*:*:*:*:*", - "matchCriteriaId": "B2F499D8-F2FB-4AE9-8464-88717C5213D6" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.4:*:*:*:*:*:*:*", - "matchCriteriaId": "7DFCA446-F247-45B8-BE02-A006FA9EAF8C" - }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*", diff --git a/CVE-2012/CVE-2012-19xx/CVE-2012-1941.json b/CVE-2012/CVE-2012-19xx/CVE-2012-1941.json index 4da001f95dd..3e8d3763e8a 100644 --- a/CVE-2012/CVE-2012-19xx/CVE-2012-1941.json +++ b/CVE-2012/CVE-2012-19xx/CVE-2012-1941.json @@ -2,7 +2,7 @@ "id": "CVE-2012-1941", "sourceIdentifier": "cve@mitre.org", "published": "2012-06-05T23:55:01.637", - "lastModified": "2017-12-29T02:29:14.817", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -201,6 +201,16 @@ "criteria": "cpe:2.3:a:mozilla:firefox:10.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "FDFC5947-3C3D-4484-8803-D6629C63B315" }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.3:*:*:*:*:*:*:*", + "matchCriteriaId": "A04BF0E2-0A40-4396-A46A-005D103D9E3F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.4:*:*:*:*:*:*:*", + "matchCriteriaId": "C0C4C930-6EC1-469D-811C-E85490AB38C3" + }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox:11.0:*:*:*:*:*:*:*", @@ -216,31 +226,6 @@ "criteria": "cpe:2.3:a:mozilla:firefox:12.0:beta6:*:*:*:*:*:*", "matchCriteriaId": "AB630A94-DA1F-4A7F-891D-E6F242C20271" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0:*:*:*:*:*:*:*", - "matchCriteriaId": "FB867E19-9678-4BC2-A0C6-1D5E1A420637" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "FDA03C94-CA08-4D5A-9D96-551A5D4892B9" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "24BA1727-264B-4E53-874D-A5DAFE275922" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.3:*:*:*:*:*:*:*", - "matchCriteriaId": "B2F499D8-F2FB-4AE9-8464-88717C5213D6" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.4:*:*:*:*:*:*:*", - "matchCriteriaId": "7DFCA446-F247-45B8-BE02-A006FA9EAF8C" - }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*", diff --git a/CVE-2012/CVE-2012-19xx/CVE-2012-1944.json b/CVE-2012/CVE-2012-19xx/CVE-2012-1944.json index 3bddccefef1..e29f739c208 100644 --- a/CVE-2012/CVE-2012-19xx/CVE-2012-1944.json +++ b/CVE-2012/CVE-2012-19xx/CVE-2012-1944.json @@ -2,7 +2,7 @@ "id": "CVE-2012-1944", "sourceIdentifier": "cve@mitre.org", "published": "2012-06-05T23:55:01.763", - "lastModified": "2017-12-29T02:29:15.080", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -201,6 +201,16 @@ "criteria": "cpe:2.3:a:mozilla:firefox:10.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "FDFC5947-3C3D-4484-8803-D6629C63B315" }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.3:*:*:*:*:*:*:*", + "matchCriteriaId": "A04BF0E2-0A40-4396-A46A-005D103D9E3F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.4:*:*:*:*:*:*:*", + "matchCriteriaId": "C0C4C930-6EC1-469D-811C-E85490AB38C3" + }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox:11.0:*:*:*:*:*:*:*", @@ -216,31 +226,6 @@ "criteria": "cpe:2.3:a:mozilla:firefox:12.0:beta6:*:*:*:*:*:*", "matchCriteriaId": "AB630A94-DA1F-4A7F-891D-E6F242C20271" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0:*:*:*:*:*:*:*", - "matchCriteriaId": "FB867E19-9678-4BC2-A0C6-1D5E1A420637" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "FDA03C94-CA08-4D5A-9D96-551A5D4892B9" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "24BA1727-264B-4E53-874D-A5DAFE275922" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.3:*:*:*:*:*:*:*", - "matchCriteriaId": "B2F499D8-F2FB-4AE9-8464-88717C5213D6" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.4:*:*:*:*:*:*:*", - "matchCriteriaId": "7DFCA446-F247-45B8-BE02-A006FA9EAF8C" - }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*", diff --git a/CVE-2012/CVE-2012-19xx/CVE-2012-1945.json b/CVE-2012/CVE-2012-19xx/CVE-2012-1945.json index 4778a7ee0bc..b5327671134 100644 --- a/CVE-2012/CVE-2012-19xx/CVE-2012-1945.json +++ b/CVE-2012/CVE-2012-19xx/CVE-2012-1945.json @@ -2,7 +2,7 @@ "id": "CVE-2012-1945", "sourceIdentifier": "cve@mitre.org", "published": "2012-06-05T23:55:01.793", - "lastModified": "2017-12-29T02:29:15.207", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -201,6 +201,16 @@ "criteria": "cpe:2.3:a:mozilla:firefox:10.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "FDFC5947-3C3D-4484-8803-D6629C63B315" }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.3:*:*:*:*:*:*:*", + "matchCriteriaId": "A04BF0E2-0A40-4396-A46A-005D103D9E3F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.4:*:*:*:*:*:*:*", + "matchCriteriaId": "C0C4C930-6EC1-469D-811C-E85490AB38C3" + }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox:11.0:*:*:*:*:*:*:*", @@ -216,31 +226,6 @@ "criteria": "cpe:2.3:a:mozilla:firefox:12.0:beta6:*:*:*:*:*:*", "matchCriteriaId": "AB630A94-DA1F-4A7F-891D-E6F242C20271" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0:*:*:*:*:*:*:*", - "matchCriteriaId": "FB867E19-9678-4BC2-A0C6-1D5E1A420637" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "FDA03C94-CA08-4D5A-9D96-551A5D4892B9" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "24BA1727-264B-4E53-874D-A5DAFE275922" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.3:*:*:*:*:*:*:*", - "matchCriteriaId": "B2F499D8-F2FB-4AE9-8464-88717C5213D6" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.4:*:*:*:*:*:*:*", - "matchCriteriaId": "7DFCA446-F247-45B8-BE02-A006FA9EAF8C" - }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*", diff --git a/CVE-2012/CVE-2012-19xx/CVE-2012-1946.json b/CVE-2012/CVE-2012-19xx/CVE-2012-1946.json index 679359bd7d4..1d901858440 100644 --- a/CVE-2012/CVE-2012-19xx/CVE-2012-1946.json +++ b/CVE-2012/CVE-2012-19xx/CVE-2012-1946.json @@ -2,7 +2,7 @@ "id": "CVE-2012-1946", "sourceIdentifier": "cve@mitre.org", "published": "2012-06-05T23:55:01.840", - "lastModified": "2017-12-29T02:29:15.330", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -201,6 +201,16 @@ "criteria": "cpe:2.3:a:mozilla:firefox:10.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "FDFC5947-3C3D-4484-8803-D6629C63B315" }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.3:*:*:*:*:*:*:*", + "matchCriteriaId": "A04BF0E2-0A40-4396-A46A-005D103D9E3F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.4:*:*:*:*:*:*:*", + "matchCriteriaId": "C0C4C930-6EC1-469D-811C-E85490AB38C3" + }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox:11.0:*:*:*:*:*:*:*", @@ -216,31 +226,6 @@ "criteria": "cpe:2.3:a:mozilla:firefox:12.0:beta6:*:*:*:*:*:*", "matchCriteriaId": "AB630A94-DA1F-4A7F-891D-E6F242C20271" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0:*:*:*:*:*:*:*", - "matchCriteriaId": "FB867E19-9678-4BC2-A0C6-1D5E1A420637" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "FDA03C94-CA08-4D5A-9D96-551A5D4892B9" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "24BA1727-264B-4E53-874D-A5DAFE275922" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.3:*:*:*:*:*:*:*", - "matchCriteriaId": "B2F499D8-F2FB-4AE9-8464-88717C5213D6" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.4:*:*:*:*:*:*:*", - "matchCriteriaId": "7DFCA446-F247-45B8-BE02-A006FA9EAF8C" - }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*", diff --git a/CVE-2012/CVE-2012-19xx/CVE-2012-1947.json b/CVE-2012/CVE-2012-19xx/CVE-2012-1947.json index c31bb9dd36f..bbcb83ee449 100644 --- a/CVE-2012/CVE-2012-19xx/CVE-2012-1947.json +++ b/CVE-2012/CVE-2012-19xx/CVE-2012-1947.json @@ -2,7 +2,7 @@ "id": "CVE-2012-1947", "sourceIdentifier": "cve@mitre.org", "published": "2012-06-05T23:55:01.887", - "lastModified": "2018-01-05T02:29:30.397", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -201,6 +201,16 @@ "criteria": "cpe:2.3:a:mozilla:firefox:10.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "FDFC5947-3C3D-4484-8803-D6629C63B315" }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.3:*:*:*:*:*:*:*", + "matchCriteriaId": "A04BF0E2-0A40-4396-A46A-005D103D9E3F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.4:*:*:*:*:*:*:*", + "matchCriteriaId": "C0C4C930-6EC1-469D-811C-E85490AB38C3" + }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox:11.0:*:*:*:*:*:*:*", @@ -216,31 +226,6 @@ "criteria": "cpe:2.3:a:mozilla:firefox:12.0:beta6:*:*:*:*:*:*", "matchCriteriaId": "AB630A94-DA1F-4A7F-891D-E6F242C20271" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0:*:*:*:*:*:*:*", - "matchCriteriaId": "FB867E19-9678-4BC2-A0C6-1D5E1A420637" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "FDA03C94-CA08-4D5A-9D96-551A5D4892B9" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "24BA1727-264B-4E53-874D-A5DAFE275922" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.3:*:*:*:*:*:*:*", - "matchCriteriaId": "B2F499D8-F2FB-4AE9-8464-88717C5213D6" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.4:*:*:*:*:*:*:*", - "matchCriteriaId": "7DFCA446-F247-45B8-BE02-A006FA9EAF8C" - }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*", diff --git a/CVE-2012/CVE-2012-19xx/CVE-2012-1948.json b/CVE-2012/CVE-2012-19xx/CVE-2012-1948.json index a9ebcfa1870..17492b1317a 100644 --- a/CVE-2012/CVE-2012-19xx/CVE-2012-1948.json +++ b/CVE-2012/CVE-2012-19xx/CVE-2012-1948.json @@ -2,7 +2,7 @@ "id": "CVE-2012-1948", "sourceIdentifier": "cve@mitre.org", "published": "2012-07-18T10:26:48.470", - "lastModified": "2017-12-29T02:29:15.613", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -218,33 +218,33 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0:*:*:*:*:*:*:*", - "matchCriteriaId": "FB867E19-9678-4BC2-A0C6-1D5E1A420637" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0:*:*:*:*:*:*:*", + "matchCriteriaId": "A1D4D8C9-5A00-46FE-9E42-CB8C2D66B120" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "FDA03C94-CA08-4D5A-9D96-551A5D4892B9" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "E639BCCB-A6BF-4174-BFAF-9674E65BA404" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "24BA1727-264B-4E53-874D-A5DAFE275922" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "FDFC5947-3C3D-4484-8803-D6629C63B315" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.3:*:*:*:*:*:*:*", - "matchCriteriaId": "B2F499D8-F2FB-4AE9-8464-88717C5213D6" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.3:*:*:*:*:*:*:*", + "matchCriteriaId": "A04BF0E2-0A40-4396-A46A-005D103D9E3F" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.4:*:*:*:*:*:*:*", - "matchCriteriaId": "7DFCA446-F247-45B8-BE02-A006FA9EAF8C" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.4:*:*:*:*:*:*:*", + "matchCriteriaId": "C0C4C930-6EC1-469D-811C-E85490AB38C3" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.5:*:*:*:*:*:*:*", - "matchCriteriaId": "45ACA594-41A6-41E9-98B0-9B16C46C9531" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.5:*:*:*:*:*:*:*", + "matchCriteriaId": "D93271DA-A9E2-459B-832E-162A803DD2E9" } ] } diff --git a/CVE-2012/CVE-2012-19xx/CVE-2012-1950.json b/CVE-2012/CVE-2012-19xx/CVE-2012-1950.json index 0f51db4c428..9195ae86c06 100644 --- a/CVE-2012/CVE-2012-19xx/CVE-2012-1950.json +++ b/CVE-2012/CVE-2012-19xx/CVE-2012-1950.json @@ -2,7 +2,7 @@ "id": "CVE-2012-1950", "sourceIdentifier": "cve@mitre.org", "published": "2012-07-18T10:26:48.580", - "lastModified": "2017-12-29T02:29:15.893", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -218,33 +218,33 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0:*:*:*:*:*:*:*", - "matchCriteriaId": "FB867E19-9678-4BC2-A0C6-1D5E1A420637" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0:*:*:*:*:*:*:*", + "matchCriteriaId": "A1D4D8C9-5A00-46FE-9E42-CB8C2D66B120" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "FDA03C94-CA08-4D5A-9D96-551A5D4892B9" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "E639BCCB-A6BF-4174-BFAF-9674E65BA404" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "24BA1727-264B-4E53-874D-A5DAFE275922" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "FDFC5947-3C3D-4484-8803-D6629C63B315" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.3:*:*:*:*:*:*:*", - "matchCriteriaId": "B2F499D8-F2FB-4AE9-8464-88717C5213D6" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.3:*:*:*:*:*:*:*", + "matchCriteriaId": "A04BF0E2-0A40-4396-A46A-005D103D9E3F" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.4:*:*:*:*:*:*:*", - "matchCriteriaId": "7DFCA446-F247-45B8-BE02-A006FA9EAF8C" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.4:*:*:*:*:*:*:*", + "matchCriteriaId": "C0C4C930-6EC1-469D-811C-E85490AB38C3" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.5:*:*:*:*:*:*:*", - "matchCriteriaId": "45ACA594-41A6-41E9-98B0-9B16C46C9531" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.5:*:*:*:*:*:*:*", + "matchCriteriaId": "D93271DA-A9E2-459B-832E-162A803DD2E9" } ] } diff --git a/CVE-2012/CVE-2012-19xx/CVE-2012-1951.json b/CVE-2012/CVE-2012-19xx/CVE-2012-1951.json index 0d01b336f50..94837786fdf 100644 --- a/CVE-2012/CVE-2012-19xx/CVE-2012-1951.json +++ b/CVE-2012/CVE-2012-19xx/CVE-2012-1951.json @@ -2,7 +2,7 @@ "id": "CVE-2012-1951", "sourceIdentifier": "cve@mitre.org", "published": "2012-07-18T10:26:48.627", - "lastModified": "2017-12-29T02:29:16.017", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -218,33 +218,33 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0:*:*:*:*:*:*:*", - "matchCriteriaId": "FB867E19-9678-4BC2-A0C6-1D5E1A420637" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0:*:*:*:*:*:*:*", + "matchCriteriaId": "A1D4D8C9-5A00-46FE-9E42-CB8C2D66B120" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "FDA03C94-CA08-4D5A-9D96-551A5D4892B9" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "E639BCCB-A6BF-4174-BFAF-9674E65BA404" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "24BA1727-264B-4E53-874D-A5DAFE275922" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "FDFC5947-3C3D-4484-8803-D6629C63B315" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.3:*:*:*:*:*:*:*", - "matchCriteriaId": "B2F499D8-F2FB-4AE9-8464-88717C5213D6" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.3:*:*:*:*:*:*:*", + "matchCriteriaId": "A04BF0E2-0A40-4396-A46A-005D103D9E3F" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.4:*:*:*:*:*:*:*", - "matchCriteriaId": "7DFCA446-F247-45B8-BE02-A006FA9EAF8C" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.4:*:*:*:*:*:*:*", + "matchCriteriaId": "C0C4C930-6EC1-469D-811C-E85490AB38C3" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.5:*:*:*:*:*:*:*", - "matchCriteriaId": "45ACA594-41A6-41E9-98B0-9B16C46C9531" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.5:*:*:*:*:*:*:*", + "matchCriteriaId": "D93271DA-A9E2-459B-832E-162A803DD2E9" } ] } diff --git a/CVE-2012/CVE-2012-19xx/CVE-2012-1952.json b/CVE-2012/CVE-2012-19xx/CVE-2012-1952.json index 4ef92b7eee0..15734a4570f 100644 --- a/CVE-2012/CVE-2012-19xx/CVE-2012-1952.json +++ b/CVE-2012/CVE-2012-19xx/CVE-2012-1952.json @@ -2,7 +2,7 @@ "id": "CVE-2012-1952", "sourceIdentifier": "cve@mitre.org", "published": "2012-07-18T10:26:48.673", - "lastModified": "2017-12-29T02:29:16.220", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -218,33 +218,33 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0:*:*:*:*:*:*:*", - "matchCriteriaId": "FB867E19-9678-4BC2-A0C6-1D5E1A420637" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0:*:*:*:*:*:*:*", + "matchCriteriaId": "A1D4D8C9-5A00-46FE-9E42-CB8C2D66B120" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "FDA03C94-CA08-4D5A-9D96-551A5D4892B9" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "E639BCCB-A6BF-4174-BFAF-9674E65BA404" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "24BA1727-264B-4E53-874D-A5DAFE275922" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "FDFC5947-3C3D-4484-8803-D6629C63B315" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.3:*:*:*:*:*:*:*", - "matchCriteriaId": "B2F499D8-F2FB-4AE9-8464-88717C5213D6" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.3:*:*:*:*:*:*:*", + "matchCriteriaId": "A04BF0E2-0A40-4396-A46A-005D103D9E3F" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.4:*:*:*:*:*:*:*", - "matchCriteriaId": "7DFCA446-F247-45B8-BE02-A006FA9EAF8C" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.4:*:*:*:*:*:*:*", + "matchCriteriaId": "C0C4C930-6EC1-469D-811C-E85490AB38C3" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.5:*:*:*:*:*:*:*", - "matchCriteriaId": "45ACA594-41A6-41E9-98B0-9B16C46C9531" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.5:*:*:*:*:*:*:*", + "matchCriteriaId": "D93271DA-A9E2-459B-832E-162A803DD2E9" } ] } diff --git a/CVE-2012/CVE-2012-19xx/CVE-2012-1953.json b/CVE-2012/CVE-2012-19xx/CVE-2012-1953.json index 9d5796b2d7a..6c475c1090a 100644 --- a/CVE-2012/CVE-2012-19xx/CVE-2012-1953.json +++ b/CVE-2012/CVE-2012-19xx/CVE-2012-1953.json @@ -2,7 +2,7 @@ "id": "CVE-2012-1953", "sourceIdentifier": "cve@mitre.org", "published": "2012-07-18T10:26:48.737", - "lastModified": "2017-12-29T02:29:16.377", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -218,33 +218,33 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0:*:*:*:*:*:*:*", - "matchCriteriaId": "FB867E19-9678-4BC2-A0C6-1D5E1A420637" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0:*:*:*:*:*:*:*", + "matchCriteriaId": "A1D4D8C9-5A00-46FE-9E42-CB8C2D66B120" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "FDA03C94-CA08-4D5A-9D96-551A5D4892B9" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "E639BCCB-A6BF-4174-BFAF-9674E65BA404" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "24BA1727-264B-4E53-874D-A5DAFE275922" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "FDFC5947-3C3D-4484-8803-D6629C63B315" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.3:*:*:*:*:*:*:*", - "matchCriteriaId": "B2F499D8-F2FB-4AE9-8464-88717C5213D6" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.3:*:*:*:*:*:*:*", + "matchCriteriaId": "A04BF0E2-0A40-4396-A46A-005D103D9E3F" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.4:*:*:*:*:*:*:*", - "matchCriteriaId": "7DFCA446-F247-45B8-BE02-A006FA9EAF8C" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.4:*:*:*:*:*:*:*", + "matchCriteriaId": "C0C4C930-6EC1-469D-811C-E85490AB38C3" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.5:*:*:*:*:*:*:*", - "matchCriteriaId": "45ACA594-41A6-41E9-98B0-9B16C46C9531" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.5:*:*:*:*:*:*:*", + "matchCriteriaId": "D93271DA-A9E2-459B-832E-162A803DD2E9" } ] } diff --git a/CVE-2012/CVE-2012-19xx/CVE-2012-1954.json b/CVE-2012/CVE-2012-19xx/CVE-2012-1954.json index 96e6e6e46dc..abdf57db143 100644 --- a/CVE-2012/CVE-2012-19xx/CVE-2012-1954.json +++ b/CVE-2012/CVE-2012-19xx/CVE-2012-1954.json @@ -2,7 +2,7 @@ "id": "CVE-2012-1954", "sourceIdentifier": "cve@mitre.org", "published": "2012-07-18T10:26:48.783", - "lastModified": "2017-12-29T02:29:16.550", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -218,33 +218,33 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0:*:*:*:*:*:*:*", - "matchCriteriaId": "FB867E19-9678-4BC2-A0C6-1D5E1A420637" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0:*:*:*:*:*:*:*", + "matchCriteriaId": "A1D4D8C9-5A00-46FE-9E42-CB8C2D66B120" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "FDA03C94-CA08-4D5A-9D96-551A5D4892B9" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "E639BCCB-A6BF-4174-BFAF-9674E65BA404" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "24BA1727-264B-4E53-874D-A5DAFE275922" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "FDFC5947-3C3D-4484-8803-D6629C63B315" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.3:*:*:*:*:*:*:*", - "matchCriteriaId": "B2F499D8-F2FB-4AE9-8464-88717C5213D6" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.3:*:*:*:*:*:*:*", + "matchCriteriaId": "A04BF0E2-0A40-4396-A46A-005D103D9E3F" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.4:*:*:*:*:*:*:*", - "matchCriteriaId": "7DFCA446-F247-45B8-BE02-A006FA9EAF8C" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.4:*:*:*:*:*:*:*", + "matchCriteriaId": "C0C4C930-6EC1-469D-811C-E85490AB38C3" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.5:*:*:*:*:*:*:*", - "matchCriteriaId": "45ACA594-41A6-41E9-98B0-9B16C46C9531" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.5:*:*:*:*:*:*:*", + "matchCriteriaId": "D93271DA-A9E2-459B-832E-162A803DD2E9" } ] } diff --git a/CVE-2012/CVE-2012-19xx/CVE-2012-1955.json b/CVE-2012/CVE-2012-19xx/CVE-2012-1955.json index 51376043a26..308981448c0 100644 --- a/CVE-2012/CVE-2012-19xx/CVE-2012-1955.json +++ b/CVE-2012/CVE-2012-19xx/CVE-2012-1955.json @@ -2,7 +2,7 @@ "id": "CVE-2012-1955", "sourceIdentifier": "cve@mitre.org", "published": "2012-07-18T10:26:48.813", - "lastModified": "2017-12-29T02:29:16.720", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -218,33 +218,33 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0:*:*:*:*:*:*:*", - "matchCriteriaId": "FB867E19-9678-4BC2-A0C6-1D5E1A420637" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0:*:*:*:*:*:*:*", + "matchCriteriaId": "A1D4D8C9-5A00-46FE-9E42-CB8C2D66B120" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "FDA03C94-CA08-4D5A-9D96-551A5D4892B9" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "E639BCCB-A6BF-4174-BFAF-9674E65BA404" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "24BA1727-264B-4E53-874D-A5DAFE275922" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "FDFC5947-3C3D-4484-8803-D6629C63B315" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.3:*:*:*:*:*:*:*", - "matchCriteriaId": "B2F499D8-F2FB-4AE9-8464-88717C5213D6" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.3:*:*:*:*:*:*:*", + "matchCriteriaId": "A04BF0E2-0A40-4396-A46A-005D103D9E3F" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.4:*:*:*:*:*:*:*", - "matchCriteriaId": "7DFCA446-F247-45B8-BE02-A006FA9EAF8C" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.4:*:*:*:*:*:*:*", + "matchCriteriaId": "C0C4C930-6EC1-469D-811C-E85490AB38C3" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.5:*:*:*:*:*:*:*", - "matchCriteriaId": "45ACA594-41A6-41E9-98B0-9B16C46C9531" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.5:*:*:*:*:*:*:*", + "matchCriteriaId": "D93271DA-A9E2-459B-832E-162A803DD2E9" } ] } diff --git a/CVE-2012/CVE-2012-19xx/CVE-2012-1957.json b/CVE-2012/CVE-2012-19xx/CVE-2012-1957.json index 4a80bdc9046..11206c7d896 100644 --- a/CVE-2012/CVE-2012-19xx/CVE-2012-1957.json +++ b/CVE-2012/CVE-2012-19xx/CVE-2012-1957.json @@ -2,7 +2,7 @@ "id": "CVE-2012-1957", "sourceIdentifier": "cve@mitre.org", "published": "2012-07-18T10:26:48.860", - "lastModified": "2017-12-29T02:29:16.877", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -218,33 +218,33 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0:*:*:*:*:*:*:*", - "matchCriteriaId": "FB867E19-9678-4BC2-A0C6-1D5E1A420637" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0:*:*:*:*:*:*:*", + "matchCriteriaId": "A1D4D8C9-5A00-46FE-9E42-CB8C2D66B120" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "FDA03C94-CA08-4D5A-9D96-551A5D4892B9" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "E639BCCB-A6BF-4174-BFAF-9674E65BA404" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "24BA1727-264B-4E53-874D-A5DAFE275922" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "FDFC5947-3C3D-4484-8803-D6629C63B315" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.3:*:*:*:*:*:*:*", - "matchCriteriaId": "B2F499D8-F2FB-4AE9-8464-88717C5213D6" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.3:*:*:*:*:*:*:*", + "matchCriteriaId": "A04BF0E2-0A40-4396-A46A-005D103D9E3F" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.4:*:*:*:*:*:*:*", - "matchCriteriaId": "7DFCA446-F247-45B8-BE02-A006FA9EAF8C" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.4:*:*:*:*:*:*:*", + "matchCriteriaId": "C0C4C930-6EC1-469D-811C-E85490AB38C3" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.5:*:*:*:*:*:*:*", - "matchCriteriaId": "45ACA594-41A6-41E9-98B0-9B16C46C9531" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.5:*:*:*:*:*:*:*", + "matchCriteriaId": "D93271DA-A9E2-459B-832E-162A803DD2E9" } ] } diff --git a/CVE-2012/CVE-2012-19xx/CVE-2012-1958.json b/CVE-2012/CVE-2012-19xx/CVE-2012-1958.json index 4449cd8f58d..4f381ead9a9 100644 --- a/CVE-2012/CVE-2012-19xx/CVE-2012-1958.json +++ b/CVE-2012/CVE-2012-19xx/CVE-2012-1958.json @@ -2,7 +2,7 @@ "id": "CVE-2012-1958", "sourceIdentifier": "cve@mitre.org", "published": "2012-07-18T10:26:48.890", - "lastModified": "2017-12-29T02:29:17.050", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -218,33 +218,33 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0:*:*:*:*:*:*:*", - "matchCriteriaId": "FB867E19-9678-4BC2-A0C6-1D5E1A420637" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0:*:*:*:*:*:*:*", + "matchCriteriaId": "A1D4D8C9-5A00-46FE-9E42-CB8C2D66B120" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "FDA03C94-CA08-4D5A-9D96-551A5D4892B9" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "E639BCCB-A6BF-4174-BFAF-9674E65BA404" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "24BA1727-264B-4E53-874D-A5DAFE275922" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "FDFC5947-3C3D-4484-8803-D6629C63B315" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.3:*:*:*:*:*:*:*", - "matchCriteriaId": "B2F499D8-F2FB-4AE9-8464-88717C5213D6" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.3:*:*:*:*:*:*:*", + "matchCriteriaId": "A04BF0E2-0A40-4396-A46A-005D103D9E3F" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.4:*:*:*:*:*:*:*", - "matchCriteriaId": "7DFCA446-F247-45B8-BE02-A006FA9EAF8C" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.4:*:*:*:*:*:*:*", + "matchCriteriaId": "C0C4C930-6EC1-469D-811C-E85490AB38C3" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.5:*:*:*:*:*:*:*", - "matchCriteriaId": "45ACA594-41A6-41E9-98B0-9B16C46C9531" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.5:*:*:*:*:*:*:*", + "matchCriteriaId": "D93271DA-A9E2-459B-832E-162A803DD2E9" } ] } diff --git a/CVE-2012/CVE-2012-19xx/CVE-2012-1959.json b/CVE-2012/CVE-2012-19xx/CVE-2012-1959.json index 3decbd0ec26..0ebf090bbdc 100644 --- a/CVE-2012/CVE-2012-19xx/CVE-2012-1959.json +++ b/CVE-2012/CVE-2012-19xx/CVE-2012-1959.json @@ -2,7 +2,7 @@ "id": "CVE-2012-1959", "sourceIdentifier": "cve@mitre.org", "published": "2012-07-18T10:26:48.937", - "lastModified": "2017-12-29T02:29:17.220", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -218,33 +218,33 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0:*:*:*:*:*:*:*", - "matchCriteriaId": "FB867E19-9678-4BC2-A0C6-1D5E1A420637" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0:*:*:*:*:*:*:*", + "matchCriteriaId": "A1D4D8C9-5A00-46FE-9E42-CB8C2D66B120" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "FDA03C94-CA08-4D5A-9D96-551A5D4892B9" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "E639BCCB-A6BF-4174-BFAF-9674E65BA404" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "24BA1727-264B-4E53-874D-A5DAFE275922" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "FDFC5947-3C3D-4484-8803-D6629C63B315" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.3:*:*:*:*:*:*:*", - "matchCriteriaId": "B2F499D8-F2FB-4AE9-8464-88717C5213D6" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.3:*:*:*:*:*:*:*", + "matchCriteriaId": "A04BF0E2-0A40-4396-A46A-005D103D9E3F" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.4:*:*:*:*:*:*:*", - "matchCriteriaId": "7DFCA446-F247-45B8-BE02-A006FA9EAF8C" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.4:*:*:*:*:*:*:*", + "matchCriteriaId": "C0C4C930-6EC1-469D-811C-E85490AB38C3" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.5:*:*:*:*:*:*:*", - "matchCriteriaId": "45ACA594-41A6-41E9-98B0-9B16C46C9531" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.5:*:*:*:*:*:*:*", + "matchCriteriaId": "D93271DA-A9E2-459B-832E-162A803DD2E9" } ] } diff --git a/CVE-2012/CVE-2012-19xx/CVE-2012-1961.json b/CVE-2012/CVE-2012-19xx/CVE-2012-1961.json index d6e86ec2e37..d6f6f37a25d 100644 --- a/CVE-2012/CVE-2012-19xx/CVE-2012-1961.json +++ b/CVE-2012/CVE-2012-19xx/CVE-2012-1961.json @@ -2,7 +2,7 @@ "id": "CVE-2012-1961", "sourceIdentifier": "cve@mitre.org", "published": "2012-07-18T10:26:49.017", - "lastModified": "2017-12-29T02:29:17.517", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -218,33 +218,33 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0:*:*:*:*:*:*:*", - "matchCriteriaId": "FB867E19-9678-4BC2-A0C6-1D5E1A420637" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0:*:*:*:*:*:*:*", + "matchCriteriaId": "A1D4D8C9-5A00-46FE-9E42-CB8C2D66B120" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "FDA03C94-CA08-4D5A-9D96-551A5D4892B9" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "E639BCCB-A6BF-4174-BFAF-9674E65BA404" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "24BA1727-264B-4E53-874D-A5DAFE275922" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "FDFC5947-3C3D-4484-8803-D6629C63B315" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.3:*:*:*:*:*:*:*", - "matchCriteriaId": "B2F499D8-F2FB-4AE9-8464-88717C5213D6" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.3:*:*:*:*:*:*:*", + "matchCriteriaId": "A04BF0E2-0A40-4396-A46A-005D103D9E3F" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.4:*:*:*:*:*:*:*", - "matchCriteriaId": "7DFCA446-F247-45B8-BE02-A006FA9EAF8C" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.4:*:*:*:*:*:*:*", + "matchCriteriaId": "C0C4C930-6EC1-469D-811C-E85490AB38C3" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.5:*:*:*:*:*:*:*", - "matchCriteriaId": "45ACA594-41A6-41E9-98B0-9B16C46C9531" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.5:*:*:*:*:*:*:*", + "matchCriteriaId": "D93271DA-A9E2-459B-832E-162A803DD2E9" } ] } diff --git a/CVE-2012/CVE-2012-19xx/CVE-2012-1962.json b/CVE-2012/CVE-2012-19xx/CVE-2012-1962.json index e659c8a31f8..0fd5c8ed1a9 100644 --- a/CVE-2012/CVE-2012-19xx/CVE-2012-1962.json +++ b/CVE-2012/CVE-2012-19xx/CVE-2012-1962.json @@ -2,7 +2,7 @@ "id": "CVE-2012-1962", "sourceIdentifier": "cve@mitre.org", "published": "2012-07-18T10:26:49.047", - "lastModified": "2017-12-29T02:29:17.673", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -218,33 +218,33 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0:*:*:*:*:*:*:*", - "matchCriteriaId": "FB867E19-9678-4BC2-A0C6-1D5E1A420637" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0:*:*:*:*:*:*:*", + "matchCriteriaId": "A1D4D8C9-5A00-46FE-9E42-CB8C2D66B120" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "FDA03C94-CA08-4D5A-9D96-551A5D4892B9" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "E639BCCB-A6BF-4174-BFAF-9674E65BA404" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "24BA1727-264B-4E53-874D-A5DAFE275922" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "FDFC5947-3C3D-4484-8803-D6629C63B315" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.3:*:*:*:*:*:*:*", - "matchCriteriaId": "B2F499D8-F2FB-4AE9-8464-88717C5213D6" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.3:*:*:*:*:*:*:*", + "matchCriteriaId": "A04BF0E2-0A40-4396-A46A-005D103D9E3F" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.4:*:*:*:*:*:*:*", - "matchCriteriaId": "7DFCA446-F247-45B8-BE02-A006FA9EAF8C" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.4:*:*:*:*:*:*:*", + "matchCriteriaId": "C0C4C930-6EC1-469D-811C-E85490AB38C3" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.5:*:*:*:*:*:*:*", - "matchCriteriaId": "45ACA594-41A6-41E9-98B0-9B16C46C9531" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.5:*:*:*:*:*:*:*", + "matchCriteriaId": "D93271DA-A9E2-459B-832E-162A803DD2E9" } ] } diff --git a/CVE-2012/CVE-2012-19xx/CVE-2012-1963.json b/CVE-2012/CVE-2012-19xx/CVE-2012-1963.json index 954c18c980a..780ad2a1546 100644 --- a/CVE-2012/CVE-2012-19xx/CVE-2012-1963.json +++ b/CVE-2012/CVE-2012-19xx/CVE-2012-1963.json @@ -2,7 +2,7 @@ "id": "CVE-2012-1963", "sourceIdentifier": "cve@mitre.org", "published": "2012-07-18T10:26:49.093", - "lastModified": "2017-12-29T02:29:17.830", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -218,33 +218,33 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0:*:*:*:*:*:*:*", - "matchCriteriaId": "FB867E19-9678-4BC2-A0C6-1D5E1A420637" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0:*:*:*:*:*:*:*", + "matchCriteriaId": "A1D4D8C9-5A00-46FE-9E42-CB8C2D66B120" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "FDA03C94-CA08-4D5A-9D96-551A5D4892B9" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "E639BCCB-A6BF-4174-BFAF-9674E65BA404" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "24BA1727-264B-4E53-874D-A5DAFE275922" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "FDFC5947-3C3D-4484-8803-D6629C63B315" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.3:*:*:*:*:*:*:*", - "matchCriteriaId": "B2F499D8-F2FB-4AE9-8464-88717C5213D6" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.3:*:*:*:*:*:*:*", + "matchCriteriaId": "A04BF0E2-0A40-4396-A46A-005D103D9E3F" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.4:*:*:*:*:*:*:*", - "matchCriteriaId": "7DFCA446-F247-45B8-BE02-A006FA9EAF8C" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.4:*:*:*:*:*:*:*", + "matchCriteriaId": "C0C4C930-6EC1-469D-811C-E85490AB38C3" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.5:*:*:*:*:*:*:*", - "matchCriteriaId": "45ACA594-41A6-41E9-98B0-9B16C46C9531" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.5:*:*:*:*:*:*:*", + "matchCriteriaId": "D93271DA-A9E2-459B-832E-162A803DD2E9" } ] } diff --git a/CVE-2012/CVE-2012-19xx/CVE-2012-1964.json b/CVE-2012/CVE-2012-19xx/CVE-2012-1964.json index 04f09a4fc95..37c65c0e013 100644 --- a/CVE-2012/CVE-2012-19xx/CVE-2012-1964.json +++ b/CVE-2012/CVE-2012-19xx/CVE-2012-1964.json @@ -2,7 +2,7 @@ "id": "CVE-2012-1964", "sourceIdentifier": "cve@mitre.org", "published": "2012-07-18T10:26:49.127", - "lastModified": "2017-12-29T02:29:17.970", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -218,33 +218,33 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0:*:*:*:*:*:*:*", - "matchCriteriaId": "FB867E19-9678-4BC2-A0C6-1D5E1A420637" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0:*:*:*:*:*:*:*", + "matchCriteriaId": "A1D4D8C9-5A00-46FE-9E42-CB8C2D66B120" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "FDA03C94-CA08-4D5A-9D96-551A5D4892B9" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "E639BCCB-A6BF-4174-BFAF-9674E65BA404" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "24BA1727-264B-4E53-874D-A5DAFE275922" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "FDFC5947-3C3D-4484-8803-D6629C63B315" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.3:*:*:*:*:*:*:*", - "matchCriteriaId": "B2F499D8-F2FB-4AE9-8464-88717C5213D6" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.3:*:*:*:*:*:*:*", + "matchCriteriaId": "A04BF0E2-0A40-4396-A46A-005D103D9E3F" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.4:*:*:*:*:*:*:*", - "matchCriteriaId": "7DFCA446-F247-45B8-BE02-A006FA9EAF8C" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.4:*:*:*:*:*:*:*", + "matchCriteriaId": "C0C4C930-6EC1-469D-811C-E85490AB38C3" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.5:*:*:*:*:*:*:*", - "matchCriteriaId": "45ACA594-41A6-41E9-98B0-9B16C46C9531" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.5:*:*:*:*:*:*:*", + "matchCriteriaId": "D93271DA-A9E2-459B-832E-162A803DD2E9" } ] } diff --git a/CVE-2012/CVE-2012-19xx/CVE-2012-1965.json b/CVE-2012/CVE-2012-19xx/CVE-2012-1965.json index 99d5b7c412d..26c24cec3a4 100644 --- a/CVE-2012/CVE-2012-19xx/CVE-2012-1965.json +++ b/CVE-2012/CVE-2012-19xx/CVE-2012-1965.json @@ -2,7 +2,7 @@ "id": "CVE-2012-1965", "sourceIdentifier": "cve@mitre.org", "published": "2012-07-18T10:26:49.173", - "lastModified": "2017-12-29T02:29:18.080", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -218,33 +218,33 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0:*:*:*:*:*:*:*", - "matchCriteriaId": "FB867E19-9678-4BC2-A0C6-1D5E1A420637" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0:*:*:*:*:*:*:*", + "matchCriteriaId": "A1D4D8C9-5A00-46FE-9E42-CB8C2D66B120" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "FDA03C94-CA08-4D5A-9D96-551A5D4892B9" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "E639BCCB-A6BF-4174-BFAF-9674E65BA404" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "24BA1727-264B-4E53-874D-A5DAFE275922" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "FDFC5947-3C3D-4484-8803-D6629C63B315" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.3:*:*:*:*:*:*:*", - "matchCriteriaId": "B2F499D8-F2FB-4AE9-8464-88717C5213D6" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.3:*:*:*:*:*:*:*", + "matchCriteriaId": "A04BF0E2-0A40-4396-A46A-005D103D9E3F" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.4:*:*:*:*:*:*:*", - "matchCriteriaId": "7DFCA446-F247-45B8-BE02-A006FA9EAF8C" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.4:*:*:*:*:*:*:*", + "matchCriteriaId": "C0C4C930-6EC1-469D-811C-E85490AB38C3" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.5:*:*:*:*:*:*:*", - "matchCriteriaId": "45ACA594-41A6-41E9-98B0-9B16C46C9531" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.5:*:*:*:*:*:*:*", + "matchCriteriaId": "D93271DA-A9E2-459B-832E-162A803DD2E9" } ] } diff --git a/CVE-2012/CVE-2012-19xx/CVE-2012-1966.json b/CVE-2012/CVE-2012-19xx/CVE-2012-1966.json index 6424b18de7b..65487589519 100644 --- a/CVE-2012/CVE-2012-19xx/CVE-2012-1966.json +++ b/CVE-2012/CVE-2012-19xx/CVE-2012-1966.json @@ -2,7 +2,7 @@ "id": "CVE-2012-1966", "sourceIdentifier": "cve@mitre.org", "published": "2012-07-18T10:26:49.203", - "lastModified": "2017-12-29T02:29:18.160", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -218,33 +218,33 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0:*:*:*:*:*:*:*", - "matchCriteriaId": "FB867E19-9678-4BC2-A0C6-1D5E1A420637" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0:*:*:*:*:*:*:*", + "matchCriteriaId": "A1D4D8C9-5A00-46FE-9E42-CB8C2D66B120" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "FDA03C94-CA08-4D5A-9D96-551A5D4892B9" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "E639BCCB-A6BF-4174-BFAF-9674E65BA404" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "24BA1727-264B-4E53-874D-A5DAFE275922" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "FDFC5947-3C3D-4484-8803-D6629C63B315" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.3:*:*:*:*:*:*:*", - "matchCriteriaId": "B2F499D8-F2FB-4AE9-8464-88717C5213D6" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.3:*:*:*:*:*:*:*", + "matchCriteriaId": "A04BF0E2-0A40-4396-A46A-005D103D9E3F" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.4:*:*:*:*:*:*:*", - "matchCriteriaId": "7DFCA446-F247-45B8-BE02-A006FA9EAF8C" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.4:*:*:*:*:*:*:*", + "matchCriteriaId": "C0C4C930-6EC1-469D-811C-E85490AB38C3" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.5:*:*:*:*:*:*:*", - "matchCriteriaId": "45ACA594-41A6-41E9-98B0-9B16C46C9531" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.5:*:*:*:*:*:*:*", + "matchCriteriaId": "D93271DA-A9E2-459B-832E-162A803DD2E9" } ] } diff --git a/CVE-2012/CVE-2012-19xx/CVE-2012-1967.json b/CVE-2012/CVE-2012-19xx/CVE-2012-1967.json index f6050ffd55a..a3a28ec0629 100644 --- a/CVE-2012/CVE-2012-19xx/CVE-2012-1967.json +++ b/CVE-2012/CVE-2012-19xx/CVE-2012-1967.json @@ -2,7 +2,7 @@ "id": "CVE-2012-1967", "sourceIdentifier": "cve@mitre.org", "published": "2012-07-18T10:26:49.250", - "lastModified": "2017-12-29T02:29:18.300", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -218,33 +218,33 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0:*:*:*:*:*:*:*", - "matchCriteriaId": "FB867E19-9678-4BC2-A0C6-1D5E1A420637" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0:*:*:*:*:*:*:*", + "matchCriteriaId": "A1D4D8C9-5A00-46FE-9E42-CB8C2D66B120" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "FDA03C94-CA08-4D5A-9D96-551A5D4892B9" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "E639BCCB-A6BF-4174-BFAF-9674E65BA404" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "24BA1727-264B-4E53-874D-A5DAFE275922" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "FDFC5947-3C3D-4484-8803-D6629C63B315" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.3:*:*:*:*:*:*:*", - "matchCriteriaId": "B2F499D8-F2FB-4AE9-8464-88717C5213D6" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.3:*:*:*:*:*:*:*", + "matchCriteriaId": "A04BF0E2-0A40-4396-A46A-005D103D9E3F" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.4:*:*:*:*:*:*:*", - "matchCriteriaId": "7DFCA446-F247-45B8-BE02-A006FA9EAF8C" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.4:*:*:*:*:*:*:*", + "matchCriteriaId": "C0C4C930-6EC1-469D-811C-E85490AB38C3" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.5:*:*:*:*:*:*:*", - "matchCriteriaId": "45ACA594-41A6-41E9-98B0-9B16C46C9531" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.5:*:*:*:*:*:*:*", + "matchCriteriaId": "D93271DA-A9E2-459B-832E-162A803DD2E9" } ] } diff --git a/CVE-2012/CVE-2012-19xx/CVE-2012-1970.json b/CVE-2012/CVE-2012-19xx/CVE-2012-1970.json index 535119e725b..5f9b2610465 100644 --- a/CVE-2012/CVE-2012-19xx/CVE-2012-1970.json +++ b/CVE-2012/CVE-2012-19xx/CVE-2012-1970.json @@ -2,7 +2,7 @@ "id": "CVE-2012-1970", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-29T10:56:39.787", - "lastModified": "2020-08-28T13:30:51.240", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -69,10 +69,10 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "versionStartIncluding": "10.0", "versionEndExcluding": "10.0.7", - "matchCriteriaId": "0845116C-FF25-4FD9-9B9A-1670E2E606FD" + "matchCriteriaId": "0707AB0D-8804-42B2-B236-6833A4260588" }, { "vulnerable": true, diff --git a/CVE-2012/CVE-2012-19xx/CVE-2012-1972.json b/CVE-2012/CVE-2012-19xx/CVE-2012-1972.json index 38ad4fdbd15..5d393471262 100644 --- a/CVE-2012/CVE-2012-19xx/CVE-2012-1972.json +++ b/CVE-2012/CVE-2012-19xx/CVE-2012-1972.json @@ -2,7 +2,7 @@ "id": "CVE-2012-1972", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-29T10:56:39.910", - "lastModified": "2020-08-28T13:33:39.967", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -69,10 +69,10 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "versionStartIncluding": "10.0", "versionEndExcluding": "10.0.7", - "matchCriteriaId": "0845116C-FF25-4FD9-9B9A-1670E2E606FD" + "matchCriteriaId": "0707AB0D-8804-42B2-B236-6833A4260588" }, { "vulnerable": true, diff --git a/CVE-2012/CVE-2012-19xx/CVE-2012-1973.json b/CVE-2012/CVE-2012-19xx/CVE-2012-1973.json index ed05717ec10..cc208d94416 100644 --- a/CVE-2012/CVE-2012-19xx/CVE-2012-1973.json +++ b/CVE-2012/CVE-2012-19xx/CVE-2012-1973.json @@ -2,7 +2,7 @@ "id": "CVE-2012-1973", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-29T10:56:39.973", - "lastModified": "2020-08-26T20:35:28.497", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -69,10 +69,10 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "versionStartIncluding": "10.0", "versionEndExcluding": "10.0.7", - "matchCriteriaId": "0845116C-FF25-4FD9-9B9A-1670E2E606FD" + "matchCriteriaId": "0707AB0D-8804-42B2-B236-6833A4260588" }, { "vulnerable": true, diff --git a/CVE-2012/CVE-2012-19xx/CVE-2012-1974.json b/CVE-2012/CVE-2012-19xx/CVE-2012-1974.json index 41b4edcc2dd..60de0265c57 100644 --- a/CVE-2012/CVE-2012-19xx/CVE-2012-1974.json +++ b/CVE-2012/CVE-2012-19xx/CVE-2012-1974.json @@ -2,7 +2,7 @@ "id": "CVE-2012-1974", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-29T10:56:40.020", - "lastModified": "2020-08-26T20:36:00.107", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -69,10 +69,10 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "versionStartIncluding": "10.0", "versionEndExcluding": "10.0.7", - "matchCriteriaId": "0845116C-FF25-4FD9-9B9A-1670E2E606FD" + "matchCriteriaId": "0707AB0D-8804-42B2-B236-6833A4260588" }, { "vulnerable": true, diff --git a/CVE-2012/CVE-2012-19xx/CVE-2012-1975.json b/CVE-2012/CVE-2012-19xx/CVE-2012-1975.json index cf4188a249d..61cf0c61bf9 100644 --- a/CVE-2012/CVE-2012-19xx/CVE-2012-1975.json +++ b/CVE-2012/CVE-2012-19xx/CVE-2012-1975.json @@ -2,7 +2,7 @@ "id": "CVE-2012-1975", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-29T10:56:40.067", - "lastModified": "2020-08-28T13:44:00.877", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -69,10 +69,10 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "versionStartIncluding": "10.0", "versionEndExcluding": "10.0.7", - "matchCriteriaId": "0845116C-FF25-4FD9-9B9A-1670E2E606FD" + "matchCriteriaId": "0707AB0D-8804-42B2-B236-6833A4260588" }, { "vulnerable": true, diff --git a/CVE-2012/CVE-2012-19xx/CVE-2012-1976.json b/CVE-2012/CVE-2012-19xx/CVE-2012-1976.json index b5a7e8c608c..343c09f5e1f 100644 --- a/CVE-2012/CVE-2012-19xx/CVE-2012-1976.json +++ b/CVE-2012/CVE-2012-19xx/CVE-2012-1976.json @@ -2,7 +2,7 @@ "id": "CVE-2012-1976", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-29T10:56:40.113", - "lastModified": "2020-08-26T20:36:27.437", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -69,10 +69,10 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "versionStartIncluding": "10.0", "versionEndExcluding": "10.0.7", - "matchCriteriaId": "0845116C-FF25-4FD9-9B9A-1670E2E606FD" + "matchCriteriaId": "0707AB0D-8804-42B2-B236-6833A4260588" }, { "vulnerable": true, diff --git a/CVE-2012/CVE-2012-31xx/CVE-2012-3105.json b/CVE-2012/CVE-2012-31xx/CVE-2012-3105.json index 32a46fe66c5..ba3da3e9c75 100644 --- a/CVE-2012/CVE-2012-31xx/CVE-2012-3105.json +++ b/CVE-2012/CVE-2012-31xx/CVE-2012-3105.json @@ -2,7 +2,7 @@ "id": "CVE-2012-3105", "sourceIdentifier": "cve@mitre.org", "published": "2012-06-05T23:55:01.967", - "lastModified": "2017-09-19T01:35:04.933", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -201,6 +201,16 @@ "criteria": "cpe:2.3:a:mozilla:firefox:10.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "FDFC5947-3C3D-4484-8803-D6629C63B315" }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.3:*:*:*:*:*:*:*", + "matchCriteriaId": "A04BF0E2-0A40-4396-A46A-005D103D9E3F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.4:*:*:*:*:*:*:*", + "matchCriteriaId": "C0C4C930-6EC1-469D-811C-E85490AB38C3" + }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox:11.0:*:*:*:*:*:*:*", @@ -216,31 +226,6 @@ "criteria": "cpe:2.3:a:mozilla:firefox:12.0:beta6:*:*:*:*:*:*", "matchCriteriaId": "AB630A94-DA1F-4A7F-891D-E6F242C20271" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0:*:*:*:*:*:*:*", - "matchCriteriaId": "FB867E19-9678-4BC2-A0C6-1D5E1A420637" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "FDA03C94-CA08-4D5A-9D96-551A5D4892B9" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "24BA1727-264B-4E53-874D-A5DAFE275922" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.3:*:*:*:*:*:*:*", - "matchCriteriaId": "B2F499D8-F2FB-4AE9-8464-88717C5213D6" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.4:*:*:*:*:*:*:*", - "matchCriteriaId": "7DFCA446-F247-45B8-BE02-A006FA9EAF8C" - }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*", diff --git a/CVE-2012/CVE-2012-39xx/CVE-2012-3956.json b/CVE-2012/CVE-2012-39xx/CVE-2012-3956.json index 692a1295f3b..f491d080cb4 100644 --- a/CVE-2012/CVE-2012-39xx/CVE-2012-3956.json +++ b/CVE-2012/CVE-2012-39xx/CVE-2012-3956.json @@ -2,7 +2,7 @@ "id": "CVE-2012-3956", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-29T10:56:40.270", - "lastModified": "2020-08-28T14:09:53.047", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -69,10 +69,10 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "versionStartIncluding": "10.0", "versionEndExcluding": "10.0.7", - "matchCriteriaId": "0845116C-FF25-4FD9-9B9A-1670E2E606FD" + "matchCriteriaId": "0707AB0D-8804-42B2-B236-6833A4260588" }, { "vulnerable": true, diff --git a/CVE-2012/CVE-2012-39xx/CVE-2012-3957.json b/CVE-2012/CVE-2012-39xx/CVE-2012-3957.json index 1cfe328096f..01144b6a597 100644 --- a/CVE-2012/CVE-2012-39xx/CVE-2012-3957.json +++ b/CVE-2012/CVE-2012-39xx/CVE-2012-3957.json @@ -2,7 +2,7 @@ "id": "CVE-2012-3957", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-29T10:56:40.317", - "lastModified": "2020-08-28T14:12:39.897", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -69,10 +69,10 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "versionStartIncluding": "10.0", "versionEndExcluding": "10.0.7", - "matchCriteriaId": "0845116C-FF25-4FD9-9B9A-1670E2E606FD" + "matchCriteriaId": "0707AB0D-8804-42B2-B236-6833A4260588" }, { "vulnerable": true, diff --git a/CVE-2012/CVE-2012-39xx/CVE-2012-3958.json b/CVE-2012/CVE-2012-39xx/CVE-2012-3958.json index 7cc00b7b600..42ab2ebf266 100644 --- a/CVE-2012/CVE-2012-39xx/CVE-2012-3958.json +++ b/CVE-2012/CVE-2012-39xx/CVE-2012-3958.json @@ -2,7 +2,7 @@ "id": "CVE-2012-3958", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-29T10:56:40.347", - "lastModified": "2017-09-19T01:35:11.807", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -63,38 +63,38 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0:*:*:*:*:*:*:*", - "matchCriteriaId": "FB867E19-9678-4BC2-A0C6-1D5E1A420637" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0:*:*:*:*:*:*:*", + "matchCriteriaId": "A1D4D8C9-5A00-46FE-9E42-CB8C2D66B120" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "FDA03C94-CA08-4D5A-9D96-551A5D4892B9" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "E639BCCB-A6BF-4174-BFAF-9674E65BA404" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "24BA1727-264B-4E53-874D-A5DAFE275922" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "FDFC5947-3C3D-4484-8803-D6629C63B315" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.3:*:*:*:*:*:*:*", - "matchCriteriaId": "B2F499D8-F2FB-4AE9-8464-88717C5213D6" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.3:*:*:*:*:*:*:*", + "matchCriteriaId": "A04BF0E2-0A40-4396-A46A-005D103D9E3F" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.4:*:*:*:*:*:*:*", - "matchCriteriaId": "7DFCA446-F247-45B8-BE02-A006FA9EAF8C" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.4:*:*:*:*:*:*:*", + "matchCriteriaId": "C0C4C930-6EC1-469D-811C-E85490AB38C3" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.5:*:*:*:*:*:*:*", - "matchCriteriaId": "45ACA594-41A6-41E9-98B0-9B16C46C9531" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.5:*:*:*:*:*:*:*", + "matchCriteriaId": "D93271DA-A9E2-459B-832E-162A803DD2E9" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.6:*:*:*:*:*:*:*", - "matchCriteriaId": "3F16E617-C808-4912-AD14-BB32B8F1D679" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.6:*:*:*:*:*:*:*", + "matchCriteriaId": "60ADFF75-220C-4729-B3C6-2CBA23C24C3C" } ] } diff --git a/CVE-2012/CVE-2012-39xx/CVE-2012-3959.json b/CVE-2012/CVE-2012-39xx/CVE-2012-3959.json index 691415f4160..2663ec05f87 100644 --- a/CVE-2012/CVE-2012-39xx/CVE-2012-3959.json +++ b/CVE-2012/CVE-2012-39xx/CVE-2012-3959.json @@ -2,7 +2,7 @@ "id": "CVE-2012-3959", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-29T10:56:40.393", - "lastModified": "2020-08-26T20:36:57.173", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -69,10 +69,10 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "versionStartIncluding": "10.0", "versionEndExcluding": "10.0.7", - "matchCriteriaId": "0845116C-FF25-4FD9-9B9A-1670E2E606FD" + "matchCriteriaId": "0707AB0D-8804-42B2-B236-6833A4260588" }, { "vulnerable": true, diff --git a/CVE-2012/CVE-2012-39xx/CVE-2012-3960.json b/CVE-2012/CVE-2012-39xx/CVE-2012-3960.json index 35f0d8a6a67..af6ce15c51d 100644 --- a/CVE-2012/CVE-2012-39xx/CVE-2012-3960.json +++ b/CVE-2012/CVE-2012-39xx/CVE-2012-3960.json @@ -2,7 +2,7 @@ "id": "CVE-2012-3960", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-29T10:56:40.457", - "lastModified": "2020-08-26T20:37:28.830", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -69,10 +69,10 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "versionStartIncluding": "10.0", "versionEndExcluding": "10.0.7", - "matchCriteriaId": "0845116C-FF25-4FD9-9B9A-1670E2E606FD" + "matchCriteriaId": "0707AB0D-8804-42B2-B236-6833A4260588" }, { "vulnerable": true, diff --git a/CVE-2012/CVE-2012-39xx/CVE-2012-3961.json b/CVE-2012/CVE-2012-39xx/CVE-2012-3961.json index fe5940069a0..ac9896962d7 100644 --- a/CVE-2012/CVE-2012-39xx/CVE-2012-3961.json +++ b/CVE-2012/CVE-2012-39xx/CVE-2012-3961.json @@ -2,7 +2,7 @@ "id": "CVE-2012-3961", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-29T10:56:40.487", - "lastModified": "2020-08-28T14:23:18.687", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -69,10 +69,10 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "versionStartIncluding": "10.0", "versionEndExcluding": "10.0.7", - "matchCriteriaId": "0845116C-FF25-4FD9-9B9A-1670E2E606FD" + "matchCriteriaId": "0707AB0D-8804-42B2-B236-6833A4260588" }, { "vulnerable": true, diff --git a/CVE-2012/CVE-2012-39xx/CVE-2012-3962.json b/CVE-2012/CVE-2012-39xx/CVE-2012-3962.json index 50dcf010ada..a6f678cb01c 100644 --- a/CVE-2012/CVE-2012-39xx/CVE-2012-3962.json +++ b/CVE-2012/CVE-2012-39xx/CVE-2012-3962.json @@ -2,7 +2,7 @@ "id": "CVE-2012-3962", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-29T10:56:40.537", - "lastModified": "2017-09-19T01:35:12.293", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -63,38 +63,38 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0:*:*:*:*:*:*:*", - "matchCriteriaId": "FB867E19-9678-4BC2-A0C6-1D5E1A420637" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0:*:*:*:*:*:*:*", + "matchCriteriaId": "A1D4D8C9-5A00-46FE-9E42-CB8C2D66B120" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "FDA03C94-CA08-4D5A-9D96-551A5D4892B9" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "E639BCCB-A6BF-4174-BFAF-9674E65BA404" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "24BA1727-264B-4E53-874D-A5DAFE275922" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "FDFC5947-3C3D-4484-8803-D6629C63B315" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.3:*:*:*:*:*:*:*", - "matchCriteriaId": "B2F499D8-F2FB-4AE9-8464-88717C5213D6" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.3:*:*:*:*:*:*:*", + "matchCriteriaId": "A04BF0E2-0A40-4396-A46A-005D103D9E3F" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.4:*:*:*:*:*:*:*", - "matchCriteriaId": "7DFCA446-F247-45B8-BE02-A006FA9EAF8C" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.4:*:*:*:*:*:*:*", + "matchCriteriaId": "C0C4C930-6EC1-469D-811C-E85490AB38C3" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.5:*:*:*:*:*:*:*", - "matchCriteriaId": "45ACA594-41A6-41E9-98B0-9B16C46C9531" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.5:*:*:*:*:*:*:*", + "matchCriteriaId": "D93271DA-A9E2-459B-832E-162A803DD2E9" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.6:*:*:*:*:*:*:*", - "matchCriteriaId": "3F16E617-C808-4912-AD14-BB32B8F1D679" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.6:*:*:*:*:*:*:*", + "matchCriteriaId": "60ADFF75-220C-4729-B3C6-2CBA23C24C3C" } ] } diff --git a/CVE-2012/CVE-2012-39xx/CVE-2012-3963.json b/CVE-2012/CVE-2012-39xx/CVE-2012-3963.json index 831914453aa..ed343d7dc9c 100644 --- a/CVE-2012/CVE-2012-39xx/CVE-2012-3963.json +++ b/CVE-2012/CVE-2012-39xx/CVE-2012-3963.json @@ -2,7 +2,7 @@ "id": "CVE-2012-3963", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-29T10:56:40.567", - "lastModified": "2020-08-26T20:38:19.863", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -69,10 +69,10 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "versionStartIncluding": "10.0", "versionEndExcluding": "10.0.7", - "matchCriteriaId": "0845116C-FF25-4FD9-9B9A-1670E2E606FD" + "matchCriteriaId": "0707AB0D-8804-42B2-B236-6833A4260588" }, { "vulnerable": true, diff --git a/CVE-2012/CVE-2012-39xx/CVE-2012-3964.json b/CVE-2012/CVE-2012-39xx/CVE-2012-3964.json index af7ac5db321..53adbebc51c 100644 --- a/CVE-2012/CVE-2012-39xx/CVE-2012-3964.json +++ b/CVE-2012/CVE-2012-39xx/CVE-2012-3964.json @@ -2,7 +2,7 @@ "id": "CVE-2012-3964", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-29T10:56:40.613", - "lastModified": "2017-09-19T01:35:12.557", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -63,38 +63,38 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0:*:*:*:*:*:*:*", - "matchCriteriaId": "FB867E19-9678-4BC2-A0C6-1D5E1A420637" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0:*:*:*:*:*:*:*", + "matchCriteriaId": "A1D4D8C9-5A00-46FE-9E42-CB8C2D66B120" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "FDA03C94-CA08-4D5A-9D96-551A5D4892B9" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "E639BCCB-A6BF-4174-BFAF-9674E65BA404" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "24BA1727-264B-4E53-874D-A5DAFE275922" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "FDFC5947-3C3D-4484-8803-D6629C63B315" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.3:*:*:*:*:*:*:*", - "matchCriteriaId": "B2F499D8-F2FB-4AE9-8464-88717C5213D6" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.3:*:*:*:*:*:*:*", + "matchCriteriaId": "A04BF0E2-0A40-4396-A46A-005D103D9E3F" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.4:*:*:*:*:*:*:*", - "matchCriteriaId": "7DFCA446-F247-45B8-BE02-A006FA9EAF8C" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.4:*:*:*:*:*:*:*", + "matchCriteriaId": "C0C4C930-6EC1-469D-811C-E85490AB38C3" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.5:*:*:*:*:*:*:*", - "matchCriteriaId": "45ACA594-41A6-41E9-98B0-9B16C46C9531" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.5:*:*:*:*:*:*:*", + "matchCriteriaId": "D93271DA-A9E2-459B-832E-162A803DD2E9" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.6:*:*:*:*:*:*:*", - "matchCriteriaId": "3F16E617-C808-4912-AD14-BB32B8F1D679" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.6:*:*:*:*:*:*:*", + "matchCriteriaId": "60ADFF75-220C-4729-B3C6-2CBA23C24C3C" } ] } diff --git a/CVE-2012/CVE-2012-39xx/CVE-2012-3966.json b/CVE-2012/CVE-2012-39xx/CVE-2012-3966.json index 0a14ee67585..b85e244eeaa 100644 --- a/CVE-2012/CVE-2012-39xx/CVE-2012-3966.json +++ b/CVE-2012/CVE-2012-39xx/CVE-2012-3966.json @@ -2,7 +2,7 @@ "id": "CVE-2012-3966", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-29T10:56:40.723", - "lastModified": "2017-09-19T01:35:12.760", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -63,38 +63,38 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0:*:*:*:*:*:*:*", - "matchCriteriaId": "FB867E19-9678-4BC2-A0C6-1D5E1A420637" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0:*:*:*:*:*:*:*", + "matchCriteriaId": "A1D4D8C9-5A00-46FE-9E42-CB8C2D66B120" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "FDA03C94-CA08-4D5A-9D96-551A5D4892B9" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "E639BCCB-A6BF-4174-BFAF-9674E65BA404" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "24BA1727-264B-4E53-874D-A5DAFE275922" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "FDFC5947-3C3D-4484-8803-D6629C63B315" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.3:*:*:*:*:*:*:*", - "matchCriteriaId": "B2F499D8-F2FB-4AE9-8464-88717C5213D6" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.3:*:*:*:*:*:*:*", + "matchCriteriaId": "A04BF0E2-0A40-4396-A46A-005D103D9E3F" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.4:*:*:*:*:*:*:*", - "matchCriteriaId": "7DFCA446-F247-45B8-BE02-A006FA9EAF8C" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.4:*:*:*:*:*:*:*", + "matchCriteriaId": "C0C4C930-6EC1-469D-811C-E85490AB38C3" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.5:*:*:*:*:*:*:*", - "matchCriteriaId": "45ACA594-41A6-41E9-98B0-9B16C46C9531" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.5:*:*:*:*:*:*:*", + "matchCriteriaId": "D93271DA-A9E2-459B-832E-162A803DD2E9" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.6:*:*:*:*:*:*:*", - "matchCriteriaId": "3F16E617-C808-4912-AD14-BB32B8F1D679" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.6:*:*:*:*:*:*:*", + "matchCriteriaId": "60ADFF75-220C-4729-B3C6-2CBA23C24C3C" } ] } diff --git a/CVE-2012/CVE-2012-39xx/CVE-2012-3967.json b/CVE-2012/CVE-2012-39xx/CVE-2012-3967.json index 2be4a065559..d5525cb1199 100644 --- a/CVE-2012/CVE-2012-39xx/CVE-2012-3967.json +++ b/CVE-2012/CVE-2012-39xx/CVE-2012-3967.json @@ -2,7 +2,7 @@ "id": "CVE-2012-3967", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-29T10:56:40.787", - "lastModified": "2020-08-14T17:21:26.127", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -70,10 +70,10 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "versionStartIncluding": "10.0", "versionEndExcluding": "10.0.7", - "matchCriteriaId": "0845116C-FF25-4FD9-9B9A-1670E2E606FD" + "matchCriteriaId": "0707AB0D-8804-42B2-B236-6833A4260588" }, { "vulnerable": true, diff --git a/CVE-2012/CVE-2012-39xx/CVE-2012-3968.json b/CVE-2012/CVE-2012-39xx/CVE-2012-3968.json index 20c9272f8f7..2fe0123a393 100644 --- a/CVE-2012/CVE-2012-39xx/CVE-2012-3968.json +++ b/CVE-2012/CVE-2012-39xx/CVE-2012-3968.json @@ -2,7 +2,7 @@ "id": "CVE-2012-3968", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-29T10:56:40.833", - "lastModified": "2020-08-28T14:23:58.203", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -69,10 +69,10 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "versionStartIncluding": "10.0", "versionEndExcluding": "10.0.7", - "matchCriteriaId": "0845116C-FF25-4FD9-9B9A-1670E2E606FD" + "matchCriteriaId": "0707AB0D-8804-42B2-B236-6833A4260588" }, { "vulnerable": true, diff --git a/CVE-2012/CVE-2012-39xx/CVE-2012-3969.json b/CVE-2012/CVE-2012-39xx/CVE-2012-3969.json index 817e8d02e52..dd84033236d 100644 --- a/CVE-2012/CVE-2012-39xx/CVE-2012-3969.json +++ b/CVE-2012/CVE-2012-39xx/CVE-2012-3969.json @@ -2,7 +2,7 @@ "id": "CVE-2012-3969", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-29T10:56:40.880", - "lastModified": "2017-09-19T01:35:13.090", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -63,38 +63,38 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0:*:*:*:*:*:*:*", - "matchCriteriaId": "FB867E19-9678-4BC2-A0C6-1D5E1A420637" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0:*:*:*:*:*:*:*", + "matchCriteriaId": "A1D4D8C9-5A00-46FE-9E42-CB8C2D66B120" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "FDA03C94-CA08-4D5A-9D96-551A5D4892B9" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "E639BCCB-A6BF-4174-BFAF-9674E65BA404" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "24BA1727-264B-4E53-874D-A5DAFE275922" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "FDFC5947-3C3D-4484-8803-D6629C63B315" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.3:*:*:*:*:*:*:*", - "matchCriteriaId": "B2F499D8-F2FB-4AE9-8464-88717C5213D6" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.3:*:*:*:*:*:*:*", + "matchCriteriaId": "A04BF0E2-0A40-4396-A46A-005D103D9E3F" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.4:*:*:*:*:*:*:*", - "matchCriteriaId": "7DFCA446-F247-45B8-BE02-A006FA9EAF8C" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.4:*:*:*:*:*:*:*", + "matchCriteriaId": "C0C4C930-6EC1-469D-811C-E85490AB38C3" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.5:*:*:*:*:*:*:*", - "matchCriteriaId": "45ACA594-41A6-41E9-98B0-9B16C46C9531" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.5:*:*:*:*:*:*:*", + "matchCriteriaId": "D93271DA-A9E2-459B-832E-162A803DD2E9" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.6:*:*:*:*:*:*:*", - "matchCriteriaId": "3F16E617-C808-4912-AD14-BB32B8F1D679" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.6:*:*:*:*:*:*:*", + "matchCriteriaId": "60ADFF75-220C-4729-B3C6-2CBA23C24C3C" } ] } diff --git a/CVE-2012/CVE-2012-39xx/CVE-2012-3970.json b/CVE-2012/CVE-2012-39xx/CVE-2012-3970.json index 652adfa1ccb..043fae7ca48 100644 --- a/CVE-2012/CVE-2012-39xx/CVE-2012-3970.json +++ b/CVE-2012/CVE-2012-39xx/CVE-2012-3970.json @@ -2,7 +2,7 @@ "id": "CVE-2012-3970", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-29T10:56:40.927", - "lastModified": "2017-09-19T01:35:13.403", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -63,38 +63,38 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0:*:*:*:*:*:*:*", - "matchCriteriaId": "FB867E19-9678-4BC2-A0C6-1D5E1A420637" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0:*:*:*:*:*:*:*", + "matchCriteriaId": "A1D4D8C9-5A00-46FE-9E42-CB8C2D66B120" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "FDA03C94-CA08-4D5A-9D96-551A5D4892B9" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "E639BCCB-A6BF-4174-BFAF-9674E65BA404" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "24BA1727-264B-4E53-874D-A5DAFE275922" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "FDFC5947-3C3D-4484-8803-D6629C63B315" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.3:*:*:*:*:*:*:*", - "matchCriteriaId": "B2F499D8-F2FB-4AE9-8464-88717C5213D6" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.3:*:*:*:*:*:*:*", + "matchCriteriaId": "A04BF0E2-0A40-4396-A46A-005D103D9E3F" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.4:*:*:*:*:*:*:*", - "matchCriteriaId": "7DFCA446-F247-45B8-BE02-A006FA9EAF8C" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.4:*:*:*:*:*:*:*", + "matchCriteriaId": "C0C4C930-6EC1-469D-811C-E85490AB38C3" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.5:*:*:*:*:*:*:*", - "matchCriteriaId": "45ACA594-41A6-41E9-98B0-9B16C46C9531" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.5:*:*:*:*:*:*:*", + "matchCriteriaId": "D93271DA-A9E2-459B-832E-162A803DD2E9" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.6:*:*:*:*:*:*:*", - "matchCriteriaId": "3F16E617-C808-4912-AD14-BB32B8F1D679" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.6:*:*:*:*:*:*:*", + "matchCriteriaId": "60ADFF75-220C-4729-B3C6-2CBA23C24C3C" } ] } diff --git a/CVE-2012/CVE-2012-39xx/CVE-2012-3972.json b/CVE-2012/CVE-2012-39xx/CVE-2012-3972.json index 1f2baea80ac..3c4bd62e566 100644 --- a/CVE-2012/CVE-2012-39xx/CVE-2012-3972.json +++ b/CVE-2012/CVE-2012-39xx/CVE-2012-3972.json @@ -2,7 +2,7 @@ "id": "CVE-2012-3972", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-29T10:56:41.003", - "lastModified": "2020-09-09T14:51:23.557", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -69,10 +69,10 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "versionStartIncluding": "10.0", "versionEndExcluding": "10.0.7", - "matchCriteriaId": "0845116C-FF25-4FD9-9B9A-1670E2E606FD" + "matchCriteriaId": "0707AB0D-8804-42B2-B236-6833A4260588" }, { "vulnerable": true, diff --git a/CVE-2012/CVE-2012-39xx/CVE-2012-3974.json b/CVE-2012/CVE-2012-39xx/CVE-2012-3974.json index 3bf1999f5f6..9d4c37959ae 100644 --- a/CVE-2012/CVE-2012-39xx/CVE-2012-3974.json +++ b/CVE-2012/CVE-2012-39xx/CVE-2012-3974.json @@ -2,7 +2,7 @@ "id": "CVE-2012-3974", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-29T10:56:41.083", - "lastModified": "2017-09-19T01:35:13.823", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -822,38 +822,38 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0:*:*:*:*:*:*:*", - "matchCriteriaId": "FB867E19-9678-4BC2-A0C6-1D5E1A420637" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0:*:*:*:*:*:*:*", + "matchCriteriaId": "A1D4D8C9-5A00-46FE-9E42-CB8C2D66B120" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "FDA03C94-CA08-4D5A-9D96-551A5D4892B9" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "E639BCCB-A6BF-4174-BFAF-9674E65BA404" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "24BA1727-264B-4E53-874D-A5DAFE275922" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "FDFC5947-3C3D-4484-8803-D6629C63B315" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.3:*:*:*:*:*:*:*", - "matchCriteriaId": "B2F499D8-F2FB-4AE9-8464-88717C5213D6" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.3:*:*:*:*:*:*:*", + "matchCriteriaId": "A04BF0E2-0A40-4396-A46A-005D103D9E3F" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.4:*:*:*:*:*:*:*", - "matchCriteriaId": "7DFCA446-F247-45B8-BE02-A006FA9EAF8C" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.4:*:*:*:*:*:*:*", + "matchCriteriaId": "C0C4C930-6EC1-469D-811C-E85490AB38C3" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.5:*:*:*:*:*:*:*", - "matchCriteriaId": "45ACA594-41A6-41E9-98B0-9B16C46C9531" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.5:*:*:*:*:*:*:*", + "matchCriteriaId": "D93271DA-A9E2-459B-832E-162A803DD2E9" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.6:*:*:*:*:*:*:*", - "matchCriteriaId": "3F16E617-C808-4912-AD14-BB32B8F1D679" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.6:*:*:*:*:*:*:*", + "matchCriteriaId": "60ADFF75-220C-4729-B3C6-2CBA23C24C3C" } ] }, diff --git a/CVE-2012/CVE-2012-39xx/CVE-2012-3976.json b/CVE-2012/CVE-2012-39xx/CVE-2012-3976.json index 1517c2729f4..49d2ef1345e 100644 --- a/CVE-2012/CVE-2012-39xx/CVE-2012-3976.json +++ b/CVE-2012/CVE-2012-39xx/CVE-2012-3976.json @@ -2,7 +2,7 @@ "id": "CVE-2012-3976", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-29T10:56:41.160", - "lastModified": "2020-08-26T20:39:08.833", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -69,10 +69,10 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "versionStartIncluding": "10.0", "versionEndExcluding": "10.0.7", - "matchCriteriaId": "0845116C-FF25-4FD9-9B9A-1670E2E606FD" + "matchCriteriaId": "0707AB0D-8804-42B2-B236-6833A4260588" }, { "vulnerable": true, diff --git a/CVE-2012/CVE-2012-39xx/CVE-2012-3978.json b/CVE-2012/CVE-2012-39xx/CVE-2012-3978.json index 2931cd552ba..a5dec76bdab 100644 --- a/CVE-2012/CVE-2012-39xx/CVE-2012-3978.json +++ b/CVE-2012/CVE-2012-39xx/CVE-2012-3978.json @@ -2,7 +2,7 @@ "id": "CVE-2012-3978", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-29T10:56:41.207", - "lastModified": "2017-09-19T01:35:14.230", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -63,38 +63,38 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0:*:*:*:*:*:*:*", - "matchCriteriaId": "FB867E19-9678-4BC2-A0C6-1D5E1A420637" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0:*:*:*:*:*:*:*", + "matchCriteriaId": "A1D4D8C9-5A00-46FE-9E42-CB8C2D66B120" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "FDA03C94-CA08-4D5A-9D96-551A5D4892B9" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "E639BCCB-A6BF-4174-BFAF-9674E65BA404" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "24BA1727-264B-4E53-874D-A5DAFE275922" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "FDFC5947-3C3D-4484-8803-D6629C63B315" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.3:*:*:*:*:*:*:*", - "matchCriteriaId": "B2F499D8-F2FB-4AE9-8464-88717C5213D6" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.3:*:*:*:*:*:*:*", + "matchCriteriaId": "A04BF0E2-0A40-4396-A46A-005D103D9E3F" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.4:*:*:*:*:*:*:*", - "matchCriteriaId": "7DFCA446-F247-45B8-BE02-A006FA9EAF8C" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.4:*:*:*:*:*:*:*", + "matchCriteriaId": "C0C4C930-6EC1-469D-811C-E85490AB38C3" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.5:*:*:*:*:*:*:*", - "matchCriteriaId": "45ACA594-41A6-41E9-98B0-9B16C46C9531" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.5:*:*:*:*:*:*:*", + "matchCriteriaId": "D93271DA-A9E2-459B-832E-162A803DD2E9" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.6:*:*:*:*:*:*:*", - "matchCriteriaId": "3F16E617-C808-4912-AD14-BB32B8F1D679" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.6:*:*:*:*:*:*:*", + "matchCriteriaId": "60ADFF75-220C-4729-B3C6-2CBA23C24C3C" } ] } diff --git a/CVE-2012/CVE-2012-39xx/CVE-2012-3979.json b/CVE-2012/CVE-2012-39xx/CVE-2012-3979.json index d5bd320809d..763faa743b2 100644 --- a/CVE-2012/CVE-2012-39xx/CVE-2012-3979.json +++ b/CVE-2012/CVE-2012-39xx/CVE-2012-3979.json @@ -2,7 +2,7 @@ "id": "CVE-2012-3979", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-29T10:56:41.237", - "lastModified": "2013-03-26T03:37:58.450", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -863,6 +863,26 @@ "criteria": "cpe:2.3:a:mozilla:firefox:10.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "FDFC5947-3C3D-4484-8803-D6629C63B315" }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.3:*:*:*:*:*:*:*", + "matchCriteriaId": "A04BF0E2-0A40-4396-A46A-005D103D9E3F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.4:*:*:*:*:*:*:*", + "matchCriteriaId": "C0C4C930-6EC1-469D-811C-E85490AB38C3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.5:*:*:*:*:*:*:*", + "matchCriteriaId": "D93271DA-A9E2-459B-832E-162A803DD2E9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.6:*:*:*:*:*:*:*", + "matchCriteriaId": "60ADFF75-220C-4729-B3C6-2CBA23C24C3C" + }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox:11.0:*:*:*:*:*:*:*", @@ -883,41 +903,6 @@ "criteria": "cpe:2.3:a:mozilla:firefox:13.0:*:*:*:*:*:*:*", "matchCriteriaId": "B038D136-BB5E-4252-B313-A13919195DB2" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0:*:*:*:*:*:*:*", - "matchCriteriaId": "FB867E19-9678-4BC2-A0C6-1D5E1A420637" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "FDA03C94-CA08-4D5A-9D96-551A5D4892B9" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "24BA1727-264B-4E53-874D-A5DAFE275922" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.3:*:*:*:*:*:*:*", - "matchCriteriaId": "B2F499D8-F2FB-4AE9-8464-88717C5213D6" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.4:*:*:*:*:*:*:*", - "matchCriteriaId": "7DFCA446-F247-45B8-BE02-A006FA9EAF8C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.5:*:*:*:*:*:*:*", - "matchCriteriaId": "45ACA594-41A6-41E9-98B0-9B16C46C9531" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.6:*:*:*:*:*:*:*", - "matchCriteriaId": "3F16E617-C808-4912-AD14-BB32B8F1D679" - }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_mobile:6.0.1:*:*:*:*:*:*:*", diff --git a/CVE-2012/CVE-2012-39xx/CVE-2012-3980.json b/CVE-2012/CVE-2012-39xx/CVE-2012-3980.json index 853bfe73868..dcbd58b39e9 100644 --- a/CVE-2012/CVE-2012-39xx/CVE-2012-3980.json +++ b/CVE-2012/CVE-2012-39xx/CVE-2012-3980.json @@ -2,7 +2,7 @@ "id": "CVE-2012-3980", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-29T10:56:41.287", - "lastModified": "2017-09-19T01:35:14.340", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -63,38 +63,38 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0:*:*:*:*:*:*:*", - "matchCriteriaId": "FB867E19-9678-4BC2-A0C6-1D5E1A420637" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0:*:*:*:*:*:*:*", + "matchCriteriaId": "A1D4D8C9-5A00-46FE-9E42-CB8C2D66B120" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "FDA03C94-CA08-4D5A-9D96-551A5D4892B9" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "E639BCCB-A6BF-4174-BFAF-9674E65BA404" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "24BA1727-264B-4E53-874D-A5DAFE275922" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "FDFC5947-3C3D-4484-8803-D6629C63B315" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.3:*:*:*:*:*:*:*", - "matchCriteriaId": "B2F499D8-F2FB-4AE9-8464-88717C5213D6" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.3:*:*:*:*:*:*:*", + "matchCriteriaId": "A04BF0E2-0A40-4396-A46A-005D103D9E3F" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.4:*:*:*:*:*:*:*", - "matchCriteriaId": "7DFCA446-F247-45B8-BE02-A006FA9EAF8C" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.4:*:*:*:*:*:*:*", + "matchCriteriaId": "C0C4C930-6EC1-469D-811C-E85490AB38C3" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.5:*:*:*:*:*:*:*", - "matchCriteriaId": "45ACA594-41A6-41E9-98B0-9B16C46C9531" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.5:*:*:*:*:*:*:*", + "matchCriteriaId": "D93271DA-A9E2-459B-832E-162A803DD2E9" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.6:*:*:*:*:*:*:*", - "matchCriteriaId": "3F16E617-C808-4912-AD14-BB32B8F1D679" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.6:*:*:*:*:*:*:*", + "matchCriteriaId": "60ADFF75-220C-4729-B3C6-2CBA23C24C3C" } ] } diff --git a/CVE-2012/CVE-2012-39xx/CVE-2012-3982.json b/CVE-2012/CVE-2012-39xx/CVE-2012-3982.json index 226a81e0549..d8815f8cd5c 100644 --- a/CVE-2012/CVE-2012-39xx/CVE-2012-3982.json +++ b/CVE-2012/CVE-2012-39xx/CVE-2012-3982.json @@ -2,7 +2,7 @@ "id": "CVE-2012-3982", "sourceIdentifier": "cve@mitre.org", "published": "2012-10-10T17:55:01.360", - "lastModified": "2020-08-10T15:53:29.497", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -63,9 +63,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "versionEndExcluding": "10.0.8", - "matchCriteriaId": "8786E9CE-A972-472D-AB8C-33F6159ECE92" + "matchCriteriaId": "ED7476CA-93F4-43FE-93F4-B7F385A1D4F0" } ] } diff --git a/CVE-2012/CVE-2012-39xx/CVE-2012-3986.json b/CVE-2012/CVE-2012-39xx/CVE-2012-3986.json index 23ed660a552..5c150258d62 100644 --- a/CVE-2012/CVE-2012-39xx/CVE-2012-3986.json +++ b/CVE-2012/CVE-2012-39xx/CVE-2012-3986.json @@ -2,7 +2,7 @@ "id": "CVE-2012-3986", "sourceIdentifier": "cve@mitre.org", "published": "2012-10-10T17:55:01.707", - "lastModified": "2020-08-10T14:47:50.280", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -63,9 +63,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "versionEndExcluding": "10.0.8", - "matchCriteriaId": "8786E9CE-A972-472D-AB8C-33F6159ECE92" + "matchCriteriaId": "ED7476CA-93F4-43FE-93F4-B7F385A1D4F0" } ] } diff --git a/CVE-2012/CVE-2012-39xx/CVE-2012-3988.json b/CVE-2012/CVE-2012-39xx/CVE-2012-3988.json index 0deb7171407..0b7f1497fcb 100644 --- a/CVE-2012/CVE-2012-39xx/CVE-2012-3988.json +++ b/CVE-2012/CVE-2012-39xx/CVE-2012-3988.json @@ -2,7 +2,7 @@ "id": "CVE-2012-3988", "sourceIdentifier": "cve@mitre.org", "published": "2012-10-10T17:55:01.800", - "lastModified": "2020-08-12T18:11:37.117", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -63,9 +63,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "versionEndExcluding": "10.0.8", - "matchCriteriaId": "8786E9CE-A972-472D-AB8C-33F6159ECE92" + "matchCriteriaId": "ED7476CA-93F4-43FE-93F4-B7F385A1D4F0" } ] } diff --git a/CVE-2012/CVE-2012-39xx/CVE-2012-3990.json b/CVE-2012/CVE-2012-39xx/CVE-2012-3990.json index 92e3b8ce26b..c97e63e07d3 100644 --- a/CVE-2012/CVE-2012-39xx/CVE-2012-3990.json +++ b/CVE-2012/CVE-2012-39xx/CVE-2012-3990.json @@ -2,7 +2,7 @@ "id": "CVE-2012-3990", "sourceIdentifier": "cve@mitre.org", "published": "2012-10-10T17:55:01.907", - "lastModified": "2020-08-13T19:27:04.097", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -63,9 +63,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "versionEndExcluding": "10.0.8", - "matchCriteriaId": "8786E9CE-A972-472D-AB8C-33F6159ECE92" + "matchCriteriaId": "ED7476CA-93F4-43FE-93F4-B7F385A1D4F0" } ] } diff --git a/CVE-2012/CVE-2012-39xx/CVE-2012-3991.json b/CVE-2012/CVE-2012-39xx/CVE-2012-3991.json index 008d4fba1c9..6cbb76ca36c 100644 --- a/CVE-2012/CVE-2012-39xx/CVE-2012-3991.json +++ b/CVE-2012/CVE-2012-39xx/CVE-2012-3991.json @@ -2,7 +2,7 @@ "id": "CVE-2012-3991", "sourceIdentifier": "cve@mitre.org", "published": "2012-10-10T17:55:01.970", - "lastModified": "2020-08-11T13:37:38.360", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -63,9 +63,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "versionEndExcluding": "10.0.8", - "matchCriteriaId": "8786E9CE-A972-472D-AB8C-33F6159ECE92" + "matchCriteriaId": "ED7476CA-93F4-43FE-93F4-B7F385A1D4F0" } ] } diff --git a/CVE-2012/CVE-2012-39xx/CVE-2012-3992.json b/CVE-2012/CVE-2012-39xx/CVE-2012-3992.json index bafa163ede7..1d5dc50bd7c 100644 --- a/CVE-2012/CVE-2012-39xx/CVE-2012-3992.json +++ b/CVE-2012/CVE-2012-39xx/CVE-2012-3992.json @@ -2,7 +2,7 @@ "id": "CVE-2012-3992", "sourceIdentifier": "cve@mitre.org", "published": "2012-10-10T17:55:02.003", - "lastModified": "2020-08-10T14:52:22.617", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -63,9 +63,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "versionEndExcluding": "10.0.8", - "matchCriteriaId": "8786E9CE-A972-472D-AB8C-33F6159ECE92" + "matchCriteriaId": "ED7476CA-93F4-43FE-93F4-B7F385A1D4F0" } ] } diff --git a/CVE-2012/CVE-2012-39xx/CVE-2012-3993.json b/CVE-2012/CVE-2012-39xx/CVE-2012-3993.json index ec7ab05c333..dd2ba300dee 100644 --- a/CVE-2012/CVE-2012-39xx/CVE-2012-3993.json +++ b/CVE-2012/CVE-2012-39xx/CVE-2012-3993.json @@ -2,7 +2,7 @@ "id": "CVE-2012-3993", "sourceIdentifier": "cve@mitre.org", "published": "2012-10-10T17:55:02.050", - "lastModified": "2020-08-13T20:43:34.227", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -63,43 +63,43 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0:*:*:*:*:*:*:*", - "matchCriteriaId": "FB867E19-9678-4BC2-A0C6-1D5E1A420637" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0:*:*:*:*:*:*:*", + "matchCriteriaId": "A1D4D8C9-5A00-46FE-9E42-CB8C2D66B120" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "FDA03C94-CA08-4D5A-9D96-551A5D4892B9" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "E639BCCB-A6BF-4174-BFAF-9674E65BA404" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "24BA1727-264B-4E53-874D-A5DAFE275922" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "FDFC5947-3C3D-4484-8803-D6629C63B315" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.3:*:*:*:*:*:*:*", - "matchCriteriaId": "B2F499D8-F2FB-4AE9-8464-88717C5213D6" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.3:*:*:*:*:*:*:*", + "matchCriteriaId": "A04BF0E2-0A40-4396-A46A-005D103D9E3F" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.4:*:*:*:*:*:*:*", - "matchCriteriaId": "7DFCA446-F247-45B8-BE02-A006FA9EAF8C" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.4:*:*:*:*:*:*:*", + "matchCriteriaId": "C0C4C930-6EC1-469D-811C-E85490AB38C3" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.5:*:*:*:*:*:*:*", - "matchCriteriaId": "45ACA594-41A6-41E9-98B0-9B16C46C9531" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.5:*:*:*:*:*:*:*", + "matchCriteriaId": "D93271DA-A9E2-459B-832E-162A803DD2E9" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.6:*:*:*:*:*:*:*", - "matchCriteriaId": "3F16E617-C808-4912-AD14-BB32B8F1D679" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.6:*:*:*:*:*:*:*", + "matchCriteriaId": "60ADFF75-220C-4729-B3C6-2CBA23C24C3C" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.7:*:*:*:*:*:*:*", - "matchCriteriaId": "78CDF4F4-14DB-4F4D-B0B7-E16F6799CEA6" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.7:*:*:*:*:*:*:*", + "matchCriteriaId": "C6CB2B38-E9B1-4DBE-83DD-F31B2E5F8D1E" } ] } diff --git a/CVE-2012/CVE-2012-39xx/CVE-2012-3994.json b/CVE-2012/CVE-2012-39xx/CVE-2012-3994.json index 701ab12fcc6..58e0ea029a1 100644 --- a/CVE-2012/CVE-2012-39xx/CVE-2012-3994.json +++ b/CVE-2012/CVE-2012-39xx/CVE-2012-3994.json @@ -2,7 +2,7 @@ "id": "CVE-2012-3994", "sourceIdentifier": "cve@mitre.org", "published": "2012-10-10T17:55:02.097", - "lastModified": "2020-08-07T15:42:31.597", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -63,9 +63,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "versionEndExcluding": "10.0.8", - "matchCriteriaId": "8786E9CE-A972-472D-AB8C-33F6159ECE92" + "matchCriteriaId": "ED7476CA-93F4-43FE-93F4-B7F385A1D4F0" } ] } diff --git a/CVE-2012/CVE-2012-39xx/CVE-2012-3995.json b/CVE-2012/CVE-2012-39xx/CVE-2012-3995.json index e1b3cc22ad5..2941971f436 100644 --- a/CVE-2012/CVE-2012-39xx/CVE-2012-3995.json +++ b/CVE-2012/CVE-2012-39xx/CVE-2012-3995.json @@ -2,7 +2,7 @@ "id": "CVE-2012-3995", "sourceIdentifier": "cve@mitre.org", "published": "2012-10-10T17:55:02.143", - "lastModified": "2020-08-13T18:12:40.547", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -63,9 +63,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "versionEndExcluding": "10.0.8", - "matchCriteriaId": "8786E9CE-A972-472D-AB8C-33F6159ECE92" + "matchCriteriaId": "ED7476CA-93F4-43FE-93F4-B7F385A1D4F0" } ] } diff --git a/CVE-2012/CVE-2012-41xx/CVE-2012-4179.json b/CVE-2012/CVE-2012-41xx/CVE-2012-4179.json index 0716103658c..8850a4692e9 100644 --- a/CVE-2012/CVE-2012-41xx/CVE-2012-4179.json +++ b/CVE-2012/CVE-2012-41xx/CVE-2012-4179.json @@ -2,7 +2,7 @@ "id": "CVE-2012-4179", "sourceIdentifier": "cve@mitre.org", "published": "2012-10-10T17:55:02.173", - "lastModified": "2020-08-13T18:21:48.077", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -63,9 +63,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "versionEndExcluding": "10.0.8", - "matchCriteriaId": "8786E9CE-A972-472D-AB8C-33F6159ECE92" + "matchCriteriaId": "ED7476CA-93F4-43FE-93F4-B7F385A1D4F0" } ] } diff --git a/CVE-2012/CVE-2012-41xx/CVE-2012-4180.json b/CVE-2012/CVE-2012-41xx/CVE-2012-4180.json index 6ded631f9a6..6e82a5a46ec 100644 --- a/CVE-2012/CVE-2012-41xx/CVE-2012-4180.json +++ b/CVE-2012/CVE-2012-41xx/CVE-2012-4180.json @@ -2,7 +2,7 @@ "id": "CVE-2012-4180", "sourceIdentifier": "cve@mitre.org", "published": "2012-10-10T17:55:02.220", - "lastModified": "2020-08-10T16:44:37.080", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -63,9 +63,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "versionEndExcluding": "10.0.8", - "matchCriteriaId": "8786E9CE-A972-472D-AB8C-33F6159ECE92" + "matchCriteriaId": "ED7476CA-93F4-43FE-93F4-B7F385A1D4F0" } ] } diff --git a/CVE-2012/CVE-2012-41xx/CVE-2012-4181.json b/CVE-2012/CVE-2012-41xx/CVE-2012-4181.json index ccae3c58a2b..d9daa62120e 100644 --- a/CVE-2012/CVE-2012-41xx/CVE-2012-4181.json +++ b/CVE-2012/CVE-2012-41xx/CVE-2012-4181.json @@ -2,7 +2,7 @@ "id": "CVE-2012-4181", "sourceIdentifier": "cve@mitre.org", "published": "2012-10-10T17:55:02.267", - "lastModified": "2020-08-07T15:42:18.127", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -63,9 +63,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "versionEndExcluding": "10.0.8", - "matchCriteriaId": "8786E9CE-A972-472D-AB8C-33F6159ECE92" + "matchCriteriaId": "ED7476CA-93F4-43FE-93F4-B7F385A1D4F0" } ] } diff --git a/CVE-2012/CVE-2012-41xx/CVE-2012-4182.json b/CVE-2012/CVE-2012-41xx/CVE-2012-4182.json index c738016fd0d..8b30802b559 100644 --- a/CVE-2012/CVE-2012-41xx/CVE-2012-4182.json +++ b/CVE-2012/CVE-2012-41xx/CVE-2012-4182.json @@ -2,7 +2,7 @@ "id": "CVE-2012-4182", "sourceIdentifier": "cve@mitre.org", "published": "2012-10-10T17:55:02.317", - "lastModified": "2020-08-13T19:32:16.933", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -63,9 +63,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "versionEndExcluding": "10.0.8", - "matchCriteriaId": "8786E9CE-A972-472D-AB8C-33F6159ECE92" + "matchCriteriaId": "ED7476CA-93F4-43FE-93F4-B7F385A1D4F0" } ] } diff --git a/CVE-2012/CVE-2012-41xx/CVE-2012-4183.json b/CVE-2012/CVE-2012-41xx/CVE-2012-4183.json index b1a98e91d02..47ee6ea4fe9 100644 --- a/CVE-2012/CVE-2012-41xx/CVE-2012-4183.json +++ b/CVE-2012/CVE-2012-41xx/CVE-2012-4183.json @@ -2,7 +2,7 @@ "id": "CVE-2012-4183", "sourceIdentifier": "cve@mitre.org", "published": "2012-10-10T17:55:02.377", - "lastModified": "2020-08-11T13:47:11.720", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -63,9 +63,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "versionEndExcluding": "10.0.8", - "matchCriteriaId": "8786E9CE-A972-472D-AB8C-33F6159ECE92" + "matchCriteriaId": "ED7476CA-93F4-43FE-93F4-B7F385A1D4F0" } ] } diff --git a/CVE-2012/CVE-2012-41xx/CVE-2012-4184.json b/CVE-2012/CVE-2012-41xx/CVE-2012-4184.json index 3e305227850..e68f8999844 100644 --- a/CVE-2012/CVE-2012-41xx/CVE-2012-4184.json +++ b/CVE-2012/CVE-2012-41xx/CVE-2012-4184.json @@ -2,7 +2,7 @@ "id": "CVE-2012-4184", "sourceIdentifier": "cve@mitre.org", "published": "2012-10-10T17:55:02.423", - "lastModified": "2020-08-13T18:32:37.500", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -63,9 +63,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "versionEndExcluding": "10.0.8", - "matchCriteriaId": "8786E9CE-A972-472D-AB8C-33F6159ECE92" + "matchCriteriaId": "ED7476CA-93F4-43FE-93F4-B7F385A1D4F0" } ] } diff --git a/CVE-2012/CVE-2012-41xx/CVE-2012-4185.json b/CVE-2012/CVE-2012-41xx/CVE-2012-4185.json index f4872930c87..eab189f03c3 100644 --- a/CVE-2012/CVE-2012-41xx/CVE-2012-4185.json +++ b/CVE-2012/CVE-2012-41xx/CVE-2012-4185.json @@ -2,7 +2,7 @@ "id": "CVE-2012-4185", "sourceIdentifier": "cve@mitre.org", "published": "2012-10-10T17:55:02.457", - "lastModified": "2020-08-10T15:19:27.830", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -63,9 +63,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "versionEndExcluding": "10.0.8", - "matchCriteriaId": "8786E9CE-A972-472D-AB8C-33F6159ECE92" + "matchCriteriaId": "ED7476CA-93F4-43FE-93F4-B7F385A1D4F0" } ] } diff --git a/CVE-2012/CVE-2012-41xx/CVE-2012-4186.json b/CVE-2012/CVE-2012-41xx/CVE-2012-4186.json index 1c57456bb17..a7ac31a2a79 100644 --- a/CVE-2012/CVE-2012-41xx/CVE-2012-4186.json +++ b/CVE-2012/CVE-2012-41xx/CVE-2012-4186.json @@ -2,7 +2,7 @@ "id": "CVE-2012-4186", "sourceIdentifier": "cve@mitre.org", "published": "2012-10-10T17:55:02.503", - "lastModified": "2020-08-11T13:43:56.960", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -63,9 +63,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "versionEndExcluding": "10.0.8", - "matchCriteriaId": "8786E9CE-A972-472D-AB8C-33F6159ECE92" + "matchCriteriaId": "ED7476CA-93F4-43FE-93F4-B7F385A1D4F0" } ] } diff --git a/CVE-2012/CVE-2012-41xx/CVE-2012-4187.json b/CVE-2012/CVE-2012-41xx/CVE-2012-4187.json index d51c4c62685..fc74bcbeefe 100644 --- a/CVE-2012/CVE-2012-41xx/CVE-2012-4187.json +++ b/CVE-2012/CVE-2012-41xx/CVE-2012-4187.json @@ -2,7 +2,7 @@ "id": "CVE-2012-4187", "sourceIdentifier": "cve@mitre.org", "published": "2012-10-10T17:55:02.567", - "lastModified": "2020-08-10T14:59:58.730", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -63,9 +63,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "versionEndExcluding": "10.0.8", - "matchCriteriaId": "8786E9CE-A972-472D-AB8C-33F6159ECE92" + "matchCriteriaId": "ED7476CA-93F4-43FE-93F4-B7F385A1D4F0" } ] } diff --git a/CVE-2012/CVE-2012-41xx/CVE-2012-4188.json b/CVE-2012/CVE-2012-41xx/CVE-2012-4188.json index 764fc2ce212..95b66143b8c 100644 --- a/CVE-2012/CVE-2012-41xx/CVE-2012-4188.json +++ b/CVE-2012/CVE-2012-41xx/CVE-2012-4188.json @@ -2,7 +2,7 @@ "id": "CVE-2012-4188", "sourceIdentifier": "cve@mitre.org", "published": "2012-10-10T17:55:02.610", - "lastModified": "2020-08-13T19:29:47.350", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -63,9 +63,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "versionEndExcluding": "10.0.8", - "matchCriteriaId": "8786E9CE-A972-472D-AB8C-33F6159ECE92" + "matchCriteriaId": "ED7476CA-93F4-43FE-93F4-B7F385A1D4F0" } ] } diff --git a/CVE-2012/CVE-2012-41xx/CVE-2012-4193.json b/CVE-2012/CVE-2012-41xx/CVE-2012-4193.json index 8ca5c607d21..623afaf493a 100644 --- a/CVE-2012/CVE-2012-41xx/CVE-2012-4193.json +++ b/CVE-2012/CVE-2012-41xx/CVE-2012-4193.json @@ -2,7 +2,7 @@ "id": "CVE-2012-4193", "sourceIdentifier": "cve@mitre.org", "published": "2012-10-12T10:44:20.367", - "lastModified": "2020-08-14T18:07:29.993", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -69,10 +69,10 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "versionStartIncluding": "10.0", "versionEndExcluding": "10.0.9", - "matchCriteriaId": "0CD36BEA-CE93-4BB6-AFA9-58A5502943B4" + "matchCriteriaId": "C80104E7-2245-47D1-BCE8-ABB65C3B2DE3" }, { "vulnerable": true, diff --git a/CVE-2012/CVE-2012-41xx/CVE-2012-4194.json b/CVE-2012/CVE-2012-41xx/CVE-2012-4194.json index b194d9d1aea..930dbe0ba81 100644 --- a/CVE-2012/CVE-2012-41xx/CVE-2012-4194.json +++ b/CVE-2012/CVE-2012-41xx/CVE-2012-4194.json @@ -2,7 +2,7 @@ "id": "CVE-2012-4194", "sourceIdentifier": "cve@mitre.org", "published": "2012-10-29T18:55:01.413", - "lastModified": "2020-08-12T17:43:30.583", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -69,10 +69,10 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "versionStartIncluding": "10.0", "versionEndExcluding": "10.0.10", - "matchCriteriaId": "938FD6DB-CA07-4A69-ADB9-ED12C871CDCF" + "matchCriteriaId": "D27ACD52-BA02-4CEC-BAF1-CD2FA48218D8" }, { "vulnerable": true, diff --git a/CVE-2012/CVE-2012-41xx/CVE-2012-4195.json b/CVE-2012/CVE-2012-41xx/CVE-2012-4195.json index c6dbb6faa05..e61c8d155d2 100644 --- a/CVE-2012/CVE-2012-41xx/CVE-2012-4195.json +++ b/CVE-2012/CVE-2012-41xx/CVE-2012-4195.json @@ -2,7 +2,7 @@ "id": "CVE-2012-4195", "sourceIdentifier": "cve@mitre.org", "published": "2012-10-29T18:55:01.460", - "lastModified": "2020-08-12T14:39:20.997", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -64,14 +64,14 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", - "versionEndExcluding": "16.0.2", - "matchCriteriaId": "29A65DA0-0970-4FDF-831D-A94C1069D6A4" + "versionEndExcluding": "10.0.10", + "matchCriteriaId": "FB790932-D3C8-4460-AE3B-06F5714F33E3" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", - "versionEndExcluding": "10.0.10", - "matchCriteriaId": "B36AE706-E410-4636-B0DF-0173DAF713BE" + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", + "versionEndExcluding": "16.0.2", + "matchCriteriaId": "29A65DA0-0970-4FDF-831D-A94C1069D6A4" }, { "vulnerable": true, diff --git a/CVE-2012/CVE-2012-41xx/CVE-2012-4196.json b/CVE-2012/CVE-2012-41xx/CVE-2012-4196.json index f6d3e4fb8da..5d0bb9a680e 100644 --- a/CVE-2012/CVE-2012-41xx/CVE-2012-4196.json +++ b/CVE-2012/CVE-2012-41xx/CVE-2012-4196.json @@ -2,7 +2,7 @@ "id": "CVE-2012-4196", "sourceIdentifier": "cve@mitre.org", "published": "2012-10-29T18:55:01.507", - "lastModified": "2020-08-12T17:45:13.697", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -69,10 +69,10 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "versionStartIncluding": "10.0", "versionEndExcluding": "10.0.10", - "matchCriteriaId": "938FD6DB-CA07-4A69-ADB9-ED12C871CDCF" + "matchCriteriaId": "D27ACD52-BA02-4CEC-BAF1-CD2FA48218D8" }, { "vulnerable": true, diff --git a/CVE-2012/CVE-2012-42xx/CVE-2012-4201.json b/CVE-2012/CVE-2012-42xx/CVE-2012-4201.json index e02c7a7fdea..4a435c6fe56 100644 --- a/CVE-2012/CVE-2012-42xx/CVE-2012-4201.json +++ b/CVE-2012/CVE-2012-42xx/CVE-2012-4201.json @@ -2,7 +2,7 @@ "id": "CVE-2012-4201", "sourceIdentifier": "cve@mitre.org", "published": "2012-11-21T12:55:01.477", - "lastModified": "2020-08-14T17:33:44.860", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -69,10 +69,10 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "versionStartIncluding": "10.0", "versionEndExcluding": "10.0.11", - "matchCriteriaId": "5C971C00-1789-4C23-A03F-E29CCF1BA917" + "matchCriteriaId": "46BBBC83-F777-4899-9F6A-094CDD9CFF0F" }, { "vulnerable": true, diff --git a/CVE-2012/CVE-2012-42xx/CVE-2012-4202.json b/CVE-2012/CVE-2012-42xx/CVE-2012-4202.json index 2fe6bdd4e06..cd177e78b51 100644 --- a/CVE-2012/CVE-2012-42xx/CVE-2012-4202.json +++ b/CVE-2012/CVE-2012-42xx/CVE-2012-4202.json @@ -2,7 +2,7 @@ "id": "CVE-2012-4202", "sourceIdentifier": "cve@mitre.org", "published": "2012-11-21T12:55:01.570", - "lastModified": "2020-08-06T16:49:58.670", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -64,14 +64,14 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", - "versionEndExcluding": "17.0", - "matchCriteriaId": "23C27B04-A1E0-4930-AF63-E2B1E57F75BE" + "versionEndExcluding": "10.0.11", + "matchCriteriaId": "9D350E7E-4990-4C93-80AD-AC5C27040549" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", - "versionEndExcluding": "10.0.11", - "matchCriteriaId": "4E21A0BB-B361-418E-A83B-F5DDDE02324F" + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", + "versionEndExcluding": "17.0", + "matchCriteriaId": "23C27B04-A1E0-4930-AF63-E2B1E57F75BE" }, { "vulnerable": true, diff --git a/CVE-2012/CVE-2012-42xx/CVE-2012-4206.json b/CVE-2012/CVE-2012-42xx/CVE-2012-4206.json index aec4325a73c..fefb2f10f3b 100644 --- a/CVE-2012/CVE-2012-42xx/CVE-2012-4206.json +++ b/CVE-2012/CVE-2012-42xx/CVE-2012-4206.json @@ -2,7 +2,7 @@ "id": "CVE-2012-4206", "sourceIdentifier": "cve@mitre.org", "published": "2012-11-21T12:55:01.930", - "lastModified": "2017-09-19T01:35:20.153", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "evaluatorComment": "Per: http://cwe.mitre.org/data/definitions/426.html\r\n\r\n'CWE-426: Untrusted Search Path'", @@ -943,58 +943,58 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0:*:*:*:*:*:*:*", - "matchCriteriaId": "FB867E19-9678-4BC2-A0C6-1D5E1A420637" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0:*:*:*:*:*:*:*", + "matchCriteriaId": "A1D4D8C9-5A00-46FE-9E42-CB8C2D66B120" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "FDA03C94-CA08-4D5A-9D96-551A5D4892B9" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "E639BCCB-A6BF-4174-BFAF-9674E65BA404" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "24BA1727-264B-4E53-874D-A5DAFE275922" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "FDFC5947-3C3D-4484-8803-D6629C63B315" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.3:*:*:*:*:*:*:*", - "matchCriteriaId": "B2F499D8-F2FB-4AE9-8464-88717C5213D6" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.3:*:*:*:*:*:*:*", + "matchCriteriaId": "A04BF0E2-0A40-4396-A46A-005D103D9E3F" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.4:*:*:*:*:*:*:*", - "matchCriteriaId": "7DFCA446-F247-45B8-BE02-A006FA9EAF8C" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.4:*:*:*:*:*:*:*", + "matchCriteriaId": "C0C4C930-6EC1-469D-811C-E85490AB38C3" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.5:*:*:*:*:*:*:*", - "matchCriteriaId": "45ACA594-41A6-41E9-98B0-9B16C46C9531" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.5:*:*:*:*:*:*:*", + "matchCriteriaId": "D93271DA-A9E2-459B-832E-162A803DD2E9" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.6:*:*:*:*:*:*:*", - "matchCriteriaId": "3F16E617-C808-4912-AD14-BB32B8F1D679" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.6:*:*:*:*:*:*:*", + "matchCriteriaId": "60ADFF75-220C-4729-B3C6-2CBA23C24C3C" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.7:*:*:*:*:*:*:*", - "matchCriteriaId": "78CDF4F4-14DB-4F4D-B0B7-E16F6799CEA6" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.7:*:*:*:*:*:*:*", + "matchCriteriaId": "C6CB2B38-E9B1-4DBE-83DD-F31B2E5F8D1E" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.8:*:*:*:*:*:*:*", - "matchCriteriaId": "B6F05F56-FD02-45C7-9A7C-37DDF38721E1" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.8:*:*:*:*:*:*:*", + "matchCriteriaId": "59FDB564-EBD6-40CF-86C1-3D07E1661AE2" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.9:*:*:*:*:*:*:*", - "matchCriteriaId": "D466287C-7C1F-418A-B608-B07A408824F0" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.9:*:*:*:*:*:*:*", + "matchCriteriaId": "8A82249A-FB28-43A1-8525-CC25F3E277E4" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.10:*:*:*:*:*:*:*", - "matchCriteriaId": "F4018BB8-F3E0-4A14-87C6-C458989E0941" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.10:*:*:*:*:*:*:*", + "matchCriteriaId": "74EE5936-45A1-4690-84F6-FBA4C5ADD3CA" } ] }, diff --git a/CVE-2012/CVE-2012-42xx/CVE-2012-4207.json b/CVE-2012/CVE-2012-42xx/CVE-2012-4207.json index ac46d738400..a817b5637c8 100644 --- a/CVE-2012/CVE-2012-42xx/CVE-2012-4207.json +++ b/CVE-2012/CVE-2012-42xx/CVE-2012-4207.json @@ -2,7 +2,7 @@ "id": "CVE-2012-4207", "sourceIdentifier": "cve@mitre.org", "published": "2012-11-21T12:55:02.023", - "lastModified": "2020-08-13T19:20:45.027", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -69,10 +69,10 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "versionStartIncluding": "10.0", "versionEndExcluding": "10.0.11", - "matchCriteriaId": "5C971C00-1789-4C23-A03F-E29CCF1BA917" + "matchCriteriaId": "46BBBC83-F777-4899-9F6A-094CDD9CFF0F" }, { "vulnerable": true, diff --git a/CVE-2012/CVE-2012-42xx/CVE-2012-4209.json b/CVE-2012/CVE-2012-42xx/CVE-2012-4209.json index 10990147659..961154d41f2 100644 --- a/CVE-2012/CVE-2012-42xx/CVE-2012-4209.json +++ b/CVE-2012/CVE-2012-42xx/CVE-2012-4209.json @@ -2,7 +2,7 @@ "id": "CVE-2012-4209", "sourceIdentifier": "cve@mitre.org", "published": "2012-11-21T12:55:02.180", - "lastModified": "2020-08-13T19:32:31.197", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -69,10 +69,10 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "versionStartIncluding": "10.0", "versionEndExcluding": "10.0.11", - "matchCriteriaId": "5C971C00-1789-4C23-A03F-E29CCF1BA917" + "matchCriteriaId": "46BBBC83-F777-4899-9F6A-094CDD9CFF0F" }, { "vulnerable": true, diff --git a/CVE-2012/CVE-2012-42xx/CVE-2012-4210.json b/CVE-2012/CVE-2012-42xx/CVE-2012-4210.json index 92027f33a69..42516cbff9b 100644 --- a/CVE-2012/CVE-2012-42xx/CVE-2012-4210.json +++ b/CVE-2012/CVE-2012-42xx/CVE-2012-4210.json @@ -2,7 +2,7 @@ "id": "CVE-2012-4210", "sourceIdentifier": "cve@mitre.org", "published": "2012-11-21T12:55:02.227", - "lastModified": "2017-09-19T01:35:20.667", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -929,58 +929,58 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0:*:*:*:*:*:*:*", - "matchCriteriaId": "FB867E19-9678-4BC2-A0C6-1D5E1A420637" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0:*:*:*:*:*:*:*", + "matchCriteriaId": "A1D4D8C9-5A00-46FE-9E42-CB8C2D66B120" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "FDA03C94-CA08-4D5A-9D96-551A5D4892B9" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "E639BCCB-A6BF-4174-BFAF-9674E65BA404" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "24BA1727-264B-4E53-874D-A5DAFE275922" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "FDFC5947-3C3D-4484-8803-D6629C63B315" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.3:*:*:*:*:*:*:*", - "matchCriteriaId": "B2F499D8-F2FB-4AE9-8464-88717C5213D6" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.3:*:*:*:*:*:*:*", + "matchCriteriaId": "A04BF0E2-0A40-4396-A46A-005D103D9E3F" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.4:*:*:*:*:*:*:*", - "matchCriteriaId": "7DFCA446-F247-45B8-BE02-A006FA9EAF8C" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.4:*:*:*:*:*:*:*", + "matchCriteriaId": "C0C4C930-6EC1-469D-811C-E85490AB38C3" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.5:*:*:*:*:*:*:*", - "matchCriteriaId": "45ACA594-41A6-41E9-98B0-9B16C46C9531" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.5:*:*:*:*:*:*:*", + "matchCriteriaId": "D93271DA-A9E2-459B-832E-162A803DD2E9" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.6:*:*:*:*:*:*:*", - "matchCriteriaId": "3F16E617-C808-4912-AD14-BB32B8F1D679" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.6:*:*:*:*:*:*:*", + "matchCriteriaId": "60ADFF75-220C-4729-B3C6-2CBA23C24C3C" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.7:*:*:*:*:*:*:*", - "matchCriteriaId": "78CDF4F4-14DB-4F4D-B0B7-E16F6799CEA6" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.7:*:*:*:*:*:*:*", + "matchCriteriaId": "C6CB2B38-E9B1-4DBE-83DD-F31B2E5F8D1E" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.8:*:*:*:*:*:*:*", - "matchCriteriaId": "B6F05F56-FD02-45C7-9A7C-37DDF38721E1" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.8:*:*:*:*:*:*:*", + "matchCriteriaId": "59FDB564-EBD6-40CF-86C1-3D07E1661AE2" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.9:*:*:*:*:*:*:*", - "matchCriteriaId": "D466287C-7C1F-418A-B608-B07A408824F0" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.9:*:*:*:*:*:*:*", + "matchCriteriaId": "8A82249A-FB28-43A1-8525-CC25F3E277E4" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:10.0.10:*:*:*:*:*:*:*", - "matchCriteriaId": "F4018BB8-F3E0-4A14-87C6-C458989E0941" + "criteria": "cpe:2.3:a:mozilla:firefox:10.0.10:*:*:*:*:*:*:*", + "matchCriteriaId": "74EE5936-45A1-4690-84F6-FBA4C5ADD3CA" } ] } diff --git a/CVE-2012/CVE-2012-42xx/CVE-2012-4213.json b/CVE-2012/CVE-2012-42xx/CVE-2012-4213.json index 9b71a0b83e2..bb519553403 100644 --- a/CVE-2012/CVE-2012-42xx/CVE-2012-4213.json +++ b/CVE-2012/CVE-2012-42xx/CVE-2012-4213.json @@ -2,7 +2,7 @@ "id": "CVE-2012-4213", "sourceIdentifier": "cve@mitre.org", "published": "2012-11-21T12:55:02.337", - "lastModified": "2020-08-12T20:01:21.823", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -64,14 +64,14 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", - "versionEndExcluding": "17.0", - "matchCriteriaId": "23C27B04-A1E0-4930-AF63-E2B1E57F75BE" + "versionEndExcluding": "10.0.11", + "matchCriteriaId": "9D350E7E-4990-4C93-80AD-AC5C27040549" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", - "versionEndExcluding": "10.0.11", - "matchCriteriaId": "4E21A0BB-B361-418E-A83B-F5DDDE02324F" + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", + "versionEndExcluding": "17.0", + "matchCriteriaId": "23C27B04-A1E0-4930-AF63-E2B1E57F75BE" }, { "vulnerable": true, diff --git a/CVE-2012/CVE-2012-42xx/CVE-2012-4214.json b/CVE-2012/CVE-2012-42xx/CVE-2012-4214.json index c5be780c4b5..c1f17b74eef 100644 --- a/CVE-2012/CVE-2012-42xx/CVE-2012-4214.json +++ b/CVE-2012/CVE-2012-42xx/CVE-2012-4214.json @@ -2,7 +2,7 @@ "id": "CVE-2012-4214", "sourceIdentifier": "cve@mitre.org", "published": "2012-11-21T12:55:02.367", - "lastModified": "2020-08-13T19:38:32.473", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -69,10 +69,10 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "versionStartIncluding": "10.0", "versionEndExcluding": "10.0.11", - "matchCriteriaId": "5C971C00-1789-4C23-A03F-E29CCF1BA917" + "matchCriteriaId": "46BBBC83-F777-4899-9F6A-094CDD9CFF0F" }, { "vulnerable": true, diff --git a/CVE-2012/CVE-2012-42xx/CVE-2012-4215.json b/CVE-2012/CVE-2012-42xx/CVE-2012-4215.json index 543769486aa..ddb556b4c2f 100644 --- a/CVE-2012/CVE-2012-42xx/CVE-2012-4215.json +++ b/CVE-2012/CVE-2012-42xx/CVE-2012-4215.json @@ -2,7 +2,7 @@ "id": "CVE-2012-4215", "sourceIdentifier": "cve@mitre.org", "published": "2012-11-21T12:55:02.413", - "lastModified": "2020-08-06T19:21:05.513", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -64,14 +64,14 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", - "versionEndExcluding": "17.0", - "matchCriteriaId": "23C27B04-A1E0-4930-AF63-E2B1E57F75BE" + "versionEndExcluding": "10.0.11", + "matchCriteriaId": "9D350E7E-4990-4C93-80AD-AC5C27040549" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", - "versionEndExcluding": "10.0.11", - "matchCriteriaId": "4E21A0BB-B361-418E-A83B-F5DDDE02324F" + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", + "versionEndExcluding": "17.0", + "matchCriteriaId": "23C27B04-A1E0-4930-AF63-E2B1E57F75BE" }, { "vulnerable": true, diff --git a/CVE-2012/CVE-2012-42xx/CVE-2012-4216.json b/CVE-2012/CVE-2012-42xx/CVE-2012-4216.json index b06bbacb0fb..b4aff7b8bd6 100644 --- a/CVE-2012/CVE-2012-42xx/CVE-2012-4216.json +++ b/CVE-2012/CVE-2012-42xx/CVE-2012-4216.json @@ -2,7 +2,7 @@ "id": "CVE-2012-4216", "sourceIdentifier": "cve@mitre.org", "published": "2012-11-21T12:55:02.447", - "lastModified": "2020-08-13T19:42:18.237", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -69,10 +69,10 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "versionStartIncluding": "10.0", "versionEndExcluding": "10.0.11", - "matchCriteriaId": "5C971C00-1789-4C23-A03F-E29CCF1BA917" + "matchCriteriaId": "46BBBC83-F777-4899-9F6A-094CDD9CFF0F" }, { "vulnerable": true, diff --git a/CVE-2012/CVE-2012-58xx/CVE-2012-5829.json b/CVE-2012/CVE-2012-58xx/CVE-2012-5829.json index ab67226378c..f27eafa1613 100644 --- a/CVE-2012/CVE-2012-58xx/CVE-2012-5829.json +++ b/CVE-2012/CVE-2012-58xx/CVE-2012-5829.json @@ -2,7 +2,7 @@ "id": "CVE-2012-5829", "sourceIdentifier": "cve@mitre.org", "published": "2012-11-21T12:55:03.257", - "lastModified": "2020-08-14T17:38:34.083", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -69,10 +69,10 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "versionStartIncluding": "10.0", "versionEndExcluding": "10.0.11", - "matchCriteriaId": "5C971C00-1789-4C23-A03F-E29CCF1BA917" + "matchCriteriaId": "46BBBC83-F777-4899-9F6A-094CDD9CFF0F" }, { "vulnerable": true, diff --git a/CVE-2012/CVE-2012-58xx/CVE-2012-5830.json b/CVE-2012/CVE-2012-58xx/CVE-2012-5830.json index f644d313968..959a2e9d362 100644 --- a/CVE-2012/CVE-2012-58xx/CVE-2012-5830.json +++ b/CVE-2012/CVE-2012-58xx/CVE-2012-5830.json @@ -2,7 +2,7 @@ "id": "CVE-2012-5830", "sourceIdentifier": "cve@mitre.org", "published": "2012-11-21T12:55:03.290", - "lastModified": "2020-08-13T17:31:30.397", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -92,10 +92,10 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "versionStartIncluding": "10.0", "versionEndExcluding": "10.0.11", - "matchCriteriaId": "5C971C00-1789-4C23-A03F-E29CCF1BA917" + "matchCriteriaId": "46BBBC83-F777-4899-9F6A-094CDD9CFF0F" }, { "vulnerable": true, diff --git a/CVE-2012/CVE-2012-58xx/CVE-2012-5833.json b/CVE-2012/CVE-2012-58xx/CVE-2012-5833.json index 05858f7353d..ec331655946 100644 --- a/CVE-2012/CVE-2012-58xx/CVE-2012-5833.json +++ b/CVE-2012/CVE-2012-58xx/CVE-2012-5833.json @@ -2,7 +2,7 @@ "id": "CVE-2012-5833", "sourceIdentifier": "cve@mitre.org", "published": "2012-11-21T12:55:03.353", - "lastModified": "2020-08-06T16:50:06.827", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -64,14 +64,14 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", - "versionEndExcluding": "17.0", - "matchCriteriaId": "23C27B04-A1E0-4930-AF63-E2B1E57F75BE" + "versionEndExcluding": "10.0.11", + "matchCriteriaId": "9D350E7E-4990-4C93-80AD-AC5C27040549" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", - "versionEndExcluding": "10.0.11", - "matchCriteriaId": "4E21A0BB-B361-418E-A83B-F5DDDE02324F" + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", + "versionEndExcluding": "17.0", + "matchCriteriaId": "23C27B04-A1E0-4930-AF63-E2B1E57F75BE" }, { "vulnerable": true, diff --git a/CVE-2012/CVE-2012-58xx/CVE-2012-5835.json b/CVE-2012/CVE-2012-58xx/CVE-2012-5835.json index b700f639e91..848224fdc80 100644 --- a/CVE-2012/CVE-2012-58xx/CVE-2012-5835.json +++ b/CVE-2012/CVE-2012-58xx/CVE-2012-5835.json @@ -2,7 +2,7 @@ "id": "CVE-2012-5835", "sourceIdentifier": "cve@mitre.org", "published": "2012-11-21T12:55:03.400", - "lastModified": "2020-08-06T16:47:38.523", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -64,14 +64,14 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", - "versionEndExcluding": "17.0", - "matchCriteriaId": "23C27B04-A1E0-4930-AF63-E2B1E57F75BE" + "versionEndExcluding": "10.0.11", + "matchCriteriaId": "9D350E7E-4990-4C93-80AD-AC5C27040549" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", - "versionEndExcluding": "10.0.11", - "matchCriteriaId": "4E21A0BB-B361-418E-A83B-F5DDDE02324F" + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", + "versionEndExcluding": "17.0", + "matchCriteriaId": "23C27B04-A1E0-4930-AF63-E2B1E57F75BE" }, { "vulnerable": true, diff --git a/CVE-2012/CVE-2012-58xx/CVE-2012-5838.json b/CVE-2012/CVE-2012-58xx/CVE-2012-5838.json index 38893cfbb53..ef423d3c735 100644 --- a/CVE-2012/CVE-2012-58xx/CVE-2012-5838.json +++ b/CVE-2012/CVE-2012-58xx/CVE-2012-5838.json @@ -2,7 +2,7 @@ "id": "CVE-2012-5838", "sourceIdentifier": "cve@mitre.org", "published": "2012-11-21T12:55:03.570", - "lastModified": "2020-08-13T14:13:28.127", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -64,14 +64,14 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", - "versionEndExcluding": "17.0", - "matchCriteriaId": "23C27B04-A1E0-4930-AF63-E2B1E57F75BE" + "versionEndExcluding": "10.0.11", + "matchCriteriaId": "9D350E7E-4990-4C93-80AD-AC5C27040549" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", - "versionEndExcluding": "10.0.11", - "matchCriteriaId": "4E21A0BB-B361-418E-A83B-F5DDDE02324F" + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", + "versionEndExcluding": "17.0", + "matchCriteriaId": "23C27B04-A1E0-4930-AF63-E2B1E57F75BE" }, { "vulnerable": true, diff --git a/CVE-2012/CVE-2012-58xx/CVE-2012-5839.json b/CVE-2012/CVE-2012-58xx/CVE-2012-5839.json index cb707bff7bb..5060fd7c04f 100644 --- a/CVE-2012/CVE-2012-58xx/CVE-2012-5839.json +++ b/CVE-2012/CVE-2012-58xx/CVE-2012-5839.json @@ -2,7 +2,7 @@ "id": "CVE-2012-5839", "sourceIdentifier": "cve@mitre.org", "published": "2012-11-21T12:55:03.617", - "lastModified": "2020-08-06T16:47:59.073", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -64,14 +64,14 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", - "versionEndExcluding": "17.0", - "matchCriteriaId": "23C27B04-A1E0-4930-AF63-E2B1E57F75BE" + "versionEndExcluding": "10.0.11", + "matchCriteriaId": "9D350E7E-4990-4C93-80AD-AC5C27040549" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", - "versionEndExcluding": "10.0.11", - "matchCriteriaId": "4E21A0BB-B361-418E-A83B-F5DDDE02324F" + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", + "versionEndExcluding": "17.0", + "matchCriteriaId": "23C27B04-A1E0-4930-AF63-E2B1E57F75BE" }, { "vulnerable": true, diff --git a/CVE-2012/CVE-2012-58xx/CVE-2012-5840.json b/CVE-2012/CVE-2012-58xx/CVE-2012-5840.json index df849c62a76..b76cf5a0491 100644 --- a/CVE-2012/CVE-2012-58xx/CVE-2012-5840.json +++ b/CVE-2012/CVE-2012-58xx/CVE-2012-5840.json @@ -2,7 +2,7 @@ "id": "CVE-2012-5840", "sourceIdentifier": "cve@mitre.org", "published": "2012-11-21T12:55:03.650", - "lastModified": "2020-08-06T17:38:34.317", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -64,14 +64,14 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", - "versionEndExcluding": "17.0", - "matchCriteriaId": "23C27B04-A1E0-4930-AF63-E2B1E57F75BE" + "versionEndExcluding": "10.0.11", + "matchCriteriaId": "9D350E7E-4990-4C93-80AD-AC5C27040549" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", - "versionEndExcluding": "10.0.11", - "matchCriteriaId": "4E21A0BB-B361-418E-A83B-F5DDDE02324F" + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", + "versionEndExcluding": "17.0", + "matchCriteriaId": "23C27B04-A1E0-4930-AF63-E2B1E57F75BE" }, { "vulnerable": true, diff --git a/CVE-2012/CVE-2012-58xx/CVE-2012-5841.json b/CVE-2012/CVE-2012-58xx/CVE-2012-5841.json index dc2c328a161..02350ff2000 100644 --- a/CVE-2012/CVE-2012-58xx/CVE-2012-5841.json +++ b/CVE-2012/CVE-2012-58xx/CVE-2012-5841.json @@ -2,7 +2,7 @@ "id": "CVE-2012-5841", "sourceIdentifier": "cve@mitre.org", "published": "2012-11-21T12:55:03.697", - "lastModified": "2020-08-06T16:48:46.497", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -64,14 +64,14 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", - "versionEndExcluding": "17.0", - "matchCriteriaId": "23C27B04-A1E0-4930-AF63-E2B1E57F75BE" + "versionEndExcluding": "10.0.11", + "matchCriteriaId": "9D350E7E-4990-4C93-80AD-AC5C27040549" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", - "versionEndExcluding": "10.0.11", - "matchCriteriaId": "4E21A0BB-B361-418E-A83B-F5DDDE02324F" + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", + "versionEndExcluding": "17.0", + "matchCriteriaId": "23C27B04-A1E0-4930-AF63-E2B1E57F75BE" }, { "vulnerable": true, diff --git a/CVE-2012/CVE-2012-58xx/CVE-2012-5842.json b/CVE-2012/CVE-2012-58xx/CVE-2012-5842.json index 8b4976c4ec6..c8c83fe6059 100644 --- a/CVE-2012/CVE-2012-58xx/CVE-2012-5842.json +++ b/CVE-2012/CVE-2012-58xx/CVE-2012-5842.json @@ -2,7 +2,7 @@ "id": "CVE-2012-5842", "sourceIdentifier": "cve@mitre.org", "published": "2012-11-21T12:55:03.743", - "lastModified": "2020-08-06T16:47:53.727", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -64,14 +64,14 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", - "versionEndExcluding": "17.0", - "matchCriteriaId": "23C27B04-A1E0-4930-AF63-E2B1E57F75BE" + "versionEndExcluding": "10.0.11", + "matchCriteriaId": "9D350E7E-4990-4C93-80AD-AC5C27040549" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", - "versionEndExcluding": "10.0.11", - "matchCriteriaId": "4E21A0BB-B361-418E-A83B-F5DDDE02324F" + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", + "versionEndExcluding": "17.0", + "matchCriteriaId": "23C27B04-A1E0-4930-AF63-E2B1E57F75BE" }, { "vulnerable": true, diff --git a/CVE-2012/CVE-2012-58xx/CVE-2012-5843.json b/CVE-2012/CVE-2012-58xx/CVE-2012-5843.json index 63649f70498..95ee27b7613 100644 --- a/CVE-2012/CVE-2012-58xx/CVE-2012-5843.json +++ b/CVE-2012/CVE-2012-58xx/CVE-2012-5843.json @@ -2,7 +2,7 @@ "id": "CVE-2012-5843", "sourceIdentifier": "cve@mitre.org", "published": "2012-11-21T12:55:03.790", - "lastModified": "2020-08-13T14:46:42.943", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -64,14 +64,14 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", - "versionEndExcluding": "17.0", - "matchCriteriaId": "23C27B04-A1E0-4930-AF63-E2B1E57F75BE" + "versionEndExcluding": "10.0.11", + "matchCriteriaId": "9D350E7E-4990-4C93-80AD-AC5C27040549" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", - "versionEndExcluding": "10.0.11", - "matchCriteriaId": "4E21A0BB-B361-418E-A83B-F5DDDE02324F" + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", + "versionEndExcluding": "17.0", + "matchCriteriaId": "23C27B04-A1E0-4930-AF63-E2B1E57F75BE" }, { "vulnerable": true, diff --git a/CVE-2013/CVE-2013-07xx/CVE-2013-0744.json b/CVE-2013/CVE-2013-07xx/CVE-2013-0744.json index c36620f023d..cf79ed07a01 100644 --- a/CVE-2013/CVE-2013-07xx/CVE-2013-0744.json +++ b/CVE-2013/CVE-2013-07xx/CVE-2013-0744.json @@ -2,7 +2,7 @@ "id": "CVE-2013-0744", "sourceIdentifier": "security@mozilla.org", "published": "2013-01-13T20:55:01.430", - "lastModified": "2020-08-04T17:35:16.523", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -69,17 +69,17 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "versionStartIncluding": "10.0", "versionEndExcluding": "10.0.12", - "matchCriteriaId": "4AE87F73-5E93-45A2-BE6A-19751DBA7435" + "matchCriteriaId": "BC13B81F-BA13-445C-9352-52C07DE5722C" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "versionStartIncluding": "17.0", "versionEndExcluding": "17.0.2", - "matchCriteriaId": "3CCFC7BF-ABCE-423B-8229-126EC1D6FA10" + "matchCriteriaId": "DBE1BFA6-20EE-44C2-8D48-17CAF2EE2D30" }, { "vulnerable": true, diff --git a/CVE-2013/CVE-2013-07xx/CVE-2013-0745.json b/CVE-2013/CVE-2013-07xx/CVE-2013-0745.json index 76f29fd05f8..364756e9b81 100644 --- a/CVE-2013/CVE-2013-07xx/CVE-2013-0745.json +++ b/CVE-2013/CVE-2013-07xx/CVE-2013-0745.json @@ -2,7 +2,7 @@ "id": "CVE-2013-0745", "sourceIdentifier": "security@mozilla.org", "published": "2013-01-13T20:55:01.477", - "lastModified": "2020-08-10T20:31:15.117", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -64,14 +64,14 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", - "versionEndExcluding": "18.0", - "matchCriteriaId": "B79F0682-C77C-4B65-B267-C370CFC70295" + "versionEndExcluding": "17.0.2", + "matchCriteriaId": "FD510D1E-3D09-40F1-88AE-41E830120384" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", - "versionEndExcluding": "17.0.2", - "matchCriteriaId": "155888ED-7B29-4305-86E3-0844B3FE70F3" + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.0", + "matchCriteriaId": "B79F0682-C77C-4B65-B267-C370CFC70295" }, { "vulnerable": true, diff --git a/CVE-2013/CVE-2013-07xx/CVE-2013-0746.json b/CVE-2013/CVE-2013-07xx/CVE-2013-0746.json index 13cadca39bd..35c6d143e90 100644 --- a/CVE-2013/CVE-2013-07xx/CVE-2013-0746.json +++ b/CVE-2013/CVE-2013-07xx/CVE-2013-0746.json @@ -2,7 +2,7 @@ "id": "CVE-2013-0746", "sourceIdentifier": "security@mozilla.org", "published": "2013-01-13T20:55:01.527", - "lastModified": "2020-08-04T18:22:51.397", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -69,17 +69,17 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "versionStartIncluding": "10.0", "versionEndExcluding": "10.0.12", - "matchCriteriaId": "4AE87F73-5E93-45A2-BE6A-19751DBA7435" + "matchCriteriaId": "BC13B81F-BA13-445C-9352-52C07DE5722C" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "versionStartIncluding": "17.0", "versionEndExcluding": "17.0.2", - "matchCriteriaId": "3CCFC7BF-ABCE-423B-8229-126EC1D6FA10" + "matchCriteriaId": "DBE1BFA6-20EE-44C2-8D48-17CAF2EE2D30" }, { "vulnerable": true, diff --git a/CVE-2013/CVE-2013-07xx/CVE-2013-0747.json b/CVE-2013/CVE-2013-07xx/CVE-2013-0747.json index 09e1a0c2c01..4246aa2ffaa 100644 --- a/CVE-2013/CVE-2013-07xx/CVE-2013-0747.json +++ b/CVE-2013/CVE-2013-07xx/CVE-2013-0747.json @@ -2,7 +2,7 @@ "id": "CVE-2013-0747", "sourceIdentifier": "security@mozilla.org", "published": "2013-01-13T20:55:01.570", - "lastModified": "2020-08-10T20:58:23.057", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -64,14 +64,14 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", - "versionEndExcluding": "18.0", - "matchCriteriaId": "B79F0682-C77C-4B65-B267-C370CFC70295" + "versionEndExcluding": "17.0.2", + "matchCriteriaId": "FD510D1E-3D09-40F1-88AE-41E830120384" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", - "versionEndExcluding": "17.0.2", - "matchCriteriaId": "155888ED-7B29-4305-86E3-0844B3FE70F3" + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.0", + "matchCriteriaId": "B79F0682-C77C-4B65-B267-C370CFC70295" }, { "vulnerable": true, diff --git a/CVE-2013/CVE-2013-07xx/CVE-2013-0748.json b/CVE-2013/CVE-2013-07xx/CVE-2013-0748.json index 4cdb952a834..a8491e1a419 100644 --- a/CVE-2013/CVE-2013-07xx/CVE-2013-0748.json +++ b/CVE-2013/CVE-2013-07xx/CVE-2013-0748.json @@ -2,7 +2,7 @@ "id": "CVE-2013-0748", "sourceIdentifier": "security@mozilla.org", "published": "2013-01-13T20:55:01.617", - "lastModified": "2020-08-04T18:59:10.697", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -69,17 +69,17 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "versionStartIncluding": "10.0", "versionEndExcluding": "10.0.12", - "matchCriteriaId": "4AE87F73-5E93-45A2-BE6A-19751DBA7435" + "matchCriteriaId": "BC13B81F-BA13-445C-9352-52C07DE5722C" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "versionStartIncluding": "17.0", "versionEndExcluding": "17.0.2", - "matchCriteriaId": "3CCFC7BF-ABCE-423B-8229-126EC1D6FA10" + "matchCriteriaId": "DBE1BFA6-20EE-44C2-8D48-17CAF2EE2D30" }, { "vulnerable": true, diff --git a/CVE-2013/CVE-2013-07xx/CVE-2013-0749.json b/CVE-2013/CVE-2013-07xx/CVE-2013-0749.json index 0cd1f5196f3..43ba3dd9157 100644 --- a/CVE-2013/CVE-2013-07xx/CVE-2013-0749.json +++ b/CVE-2013/CVE-2013-07xx/CVE-2013-0749.json @@ -2,7 +2,7 @@ "id": "CVE-2013-0749", "sourceIdentifier": "security@mozilla.org", "published": "2013-01-13T20:55:01.667", - "lastModified": "2020-08-07T17:49:54.093", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -69,17 +69,17 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "versionStartIncluding": "10.0", "versionEndExcluding": "10.0.12", - "matchCriteriaId": "4AE87F73-5E93-45A2-BE6A-19751DBA7435" + "matchCriteriaId": "BC13B81F-BA13-445C-9352-52C07DE5722C" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "versionStartIncluding": "17.0", "versionEndExcluding": "17.0.2", - "matchCriteriaId": "3CCFC7BF-ABCE-423B-8229-126EC1D6FA10" + "matchCriteriaId": "DBE1BFA6-20EE-44C2-8D48-17CAF2EE2D30" }, { "vulnerable": true, diff --git a/CVE-2013/CVE-2013-07xx/CVE-2013-0750.json b/CVE-2013/CVE-2013-07xx/CVE-2013-0750.json index 912e3bbd83d..5d2452be994 100644 --- a/CVE-2013/CVE-2013-07xx/CVE-2013-0750.json +++ b/CVE-2013/CVE-2013-07xx/CVE-2013-0750.json @@ -2,7 +2,7 @@ "id": "CVE-2013-0750", "sourceIdentifier": "security@mozilla.org", "published": "2013-01-13T20:55:01.713", - "lastModified": "2020-08-04T18:59:54.540", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -69,17 +69,17 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "versionStartIncluding": "10.0", "versionEndExcluding": "10.0.12", - "matchCriteriaId": "4AE87F73-5E93-45A2-BE6A-19751DBA7435" + "matchCriteriaId": "BC13B81F-BA13-445C-9352-52C07DE5722C" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "versionStartIncluding": "17.0", "versionEndExcluding": "17.0.2", - "matchCriteriaId": "3CCFC7BF-ABCE-423B-8229-126EC1D6FA10" + "matchCriteriaId": "DBE1BFA6-20EE-44C2-8D48-17CAF2EE2D30" }, { "vulnerable": true, diff --git a/CVE-2013/CVE-2013-07xx/CVE-2013-0752.json b/CVE-2013/CVE-2013-07xx/CVE-2013-0752.json index d2fe7c8e705..035705a46f5 100644 --- a/CVE-2013/CVE-2013-07xx/CVE-2013-0752.json +++ b/CVE-2013/CVE-2013-07xx/CVE-2013-0752.json @@ -2,7 +2,7 @@ "id": "CVE-2013-0752", "sourceIdentifier": "security@mozilla.org", "published": "2013-01-13T20:55:01.807", - "lastModified": "2020-08-10T20:52:39.753", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -64,14 +64,14 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", - "versionEndExcluding": "18.0", - "matchCriteriaId": "B79F0682-C77C-4B65-B267-C370CFC70295" + "versionEndExcluding": "17.0.2", + "matchCriteriaId": "FD510D1E-3D09-40F1-88AE-41E830120384" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", - "versionEndExcluding": "17.0.2", - "matchCriteriaId": "155888ED-7B29-4305-86E3-0844B3FE70F3" + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.0", + "matchCriteriaId": "B79F0682-C77C-4B65-B267-C370CFC70295" }, { "vulnerable": true, diff --git a/CVE-2013/CVE-2013-07xx/CVE-2013-0753.json b/CVE-2013/CVE-2013-07xx/CVE-2013-0753.json index ad1ad1b7a03..26af62d53a5 100644 --- a/CVE-2013/CVE-2013-07xx/CVE-2013-0753.json +++ b/CVE-2013/CVE-2013-07xx/CVE-2013-0753.json @@ -2,7 +2,7 @@ "id": "CVE-2013-0753", "sourceIdentifier": "security@mozilla.org", "published": "2013-01-13T20:55:01.853", - "lastModified": "2020-08-04T16:21:37.827", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -69,17 +69,17 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "versionStartIncluding": "10.0", "versionEndExcluding": "10.0.12", - "matchCriteriaId": "4AE87F73-5E93-45A2-BE6A-19751DBA7435" + "matchCriteriaId": "BC13B81F-BA13-445C-9352-52C07DE5722C" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "versionStartIncluding": "17.0", "versionEndExcluding": "17.0.2", - "matchCriteriaId": "3CCFC7BF-ABCE-423B-8229-126EC1D6FA10" + "matchCriteriaId": "DBE1BFA6-20EE-44C2-8D48-17CAF2EE2D30" }, { "vulnerable": true, diff --git a/CVE-2013/CVE-2013-07xx/CVE-2013-0754.json b/CVE-2013/CVE-2013-07xx/CVE-2013-0754.json index 309cfd2b95c..55c157bf307 100644 --- a/CVE-2013/CVE-2013-07xx/CVE-2013-0754.json +++ b/CVE-2013/CVE-2013-07xx/CVE-2013-0754.json @@ -2,7 +2,7 @@ "id": "CVE-2013-0754", "sourceIdentifier": "security@mozilla.org", "published": "2013-01-13T20:55:01.883", - "lastModified": "2020-08-04T15:35:05.860", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -69,17 +69,17 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "versionStartIncluding": "10.0", "versionEndExcluding": "10.0.12", - "matchCriteriaId": "4AE87F73-5E93-45A2-BE6A-19751DBA7435" + "matchCriteriaId": "BC13B81F-BA13-445C-9352-52C07DE5722C" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "versionStartIncluding": "17.0", "versionEndExcluding": "17.0.2", - "matchCriteriaId": "3CCFC7BF-ABCE-423B-8229-126EC1D6FA10" + "matchCriteriaId": "DBE1BFA6-20EE-44C2-8D48-17CAF2EE2D30" }, { "vulnerable": true, diff --git a/CVE-2013/CVE-2013-07xx/CVE-2013-0755.json b/CVE-2013/CVE-2013-07xx/CVE-2013-0755.json index 05c82ed8e9a..d01888d55e2 100644 --- a/CVE-2013/CVE-2013-07xx/CVE-2013-0755.json +++ b/CVE-2013/CVE-2013-07xx/CVE-2013-0755.json @@ -2,7 +2,7 @@ "id": "CVE-2013-0755", "sourceIdentifier": "security@mozilla.org", "published": "2013-01-13T20:55:01.930", - "lastModified": "2020-08-10T21:05:59.677", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -64,14 +64,14 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", - "versionEndExcluding": "18.0", - "matchCriteriaId": "B79F0682-C77C-4B65-B267-C370CFC70295" + "versionEndExcluding": "17.0.2", + "matchCriteriaId": "FD510D1E-3D09-40F1-88AE-41E830120384" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", - "versionEndExcluding": "17.0.2", - "matchCriteriaId": "155888ED-7B29-4305-86E3-0844B3FE70F3" + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.0", + "matchCriteriaId": "B79F0682-C77C-4B65-B267-C370CFC70295" }, { "vulnerable": true, diff --git a/CVE-2013/CVE-2013-07xx/CVE-2013-0756.json b/CVE-2013/CVE-2013-07xx/CVE-2013-0756.json index ab112400b24..0b9272c65c1 100644 --- a/CVE-2013/CVE-2013-07xx/CVE-2013-0756.json +++ b/CVE-2013/CVE-2013-07xx/CVE-2013-0756.json @@ -2,7 +2,7 @@ "id": "CVE-2013-0756", "sourceIdentifier": "security@mozilla.org", "published": "2013-01-13T20:55:01.963", - "lastModified": "2020-08-10T21:08:16.433", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -64,14 +64,14 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", - "versionEndExcluding": "18.0", - "matchCriteriaId": "B79F0682-C77C-4B65-B267-C370CFC70295" + "versionEndExcluding": "17.0.2", + "matchCriteriaId": "FD510D1E-3D09-40F1-88AE-41E830120384" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", - "versionEndExcluding": "17.0.2", - "matchCriteriaId": "155888ED-7B29-4305-86E3-0844B3FE70F3" + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.0", + "matchCriteriaId": "B79F0682-C77C-4B65-B267-C370CFC70295" }, { "vulnerable": true, diff --git a/CVE-2013/CVE-2013-07xx/CVE-2013-0757.json b/CVE-2013/CVE-2013-07xx/CVE-2013-0757.json index 98c097bb3d2..05741f46f30 100644 --- a/CVE-2013/CVE-2013-07xx/CVE-2013-0757.json +++ b/CVE-2013/CVE-2013-07xx/CVE-2013-0757.json @@ -2,7 +2,7 @@ "id": "CVE-2013-0757", "sourceIdentifier": "security@mozilla.org", "published": "2013-01-13T20:55:02.010", - "lastModified": "2020-08-11T13:08:36.350", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -64,14 +64,14 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", - "versionEndExcluding": "18.0", - "matchCriteriaId": "B79F0682-C77C-4B65-B267-C370CFC70295" + "versionEndExcluding": "17.0.2", + "matchCriteriaId": "FD510D1E-3D09-40F1-88AE-41E830120384" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", - "versionEndExcluding": "17.0.2", - "matchCriteriaId": "155888ED-7B29-4305-86E3-0844B3FE70F3" + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.0", + "matchCriteriaId": "B79F0682-C77C-4B65-B267-C370CFC70295" }, { "vulnerable": true, diff --git a/CVE-2013/CVE-2013-07xx/CVE-2013-0758.json b/CVE-2013/CVE-2013-07xx/CVE-2013-0758.json index 635e5182d1b..23b4c8f53d2 100644 --- a/CVE-2013/CVE-2013-07xx/CVE-2013-0758.json +++ b/CVE-2013/CVE-2013-07xx/CVE-2013-0758.json @@ -2,7 +2,7 @@ "id": "CVE-2013-0758", "sourceIdentifier": "security@mozilla.org", "published": "2013-01-13T20:55:02.040", - "lastModified": "2020-08-04T15:32:30.123", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -69,17 +69,17 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "versionStartIncluding": "10.0", "versionEndExcluding": "10.0.12", - "matchCriteriaId": "4AE87F73-5E93-45A2-BE6A-19751DBA7435" + "matchCriteriaId": "BC13B81F-BA13-445C-9352-52C07DE5722C" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "versionStartIncluding": "17.0", "versionEndExcluding": "17.0.2", - "matchCriteriaId": "3CCFC7BF-ABCE-423B-8229-126EC1D6FA10" + "matchCriteriaId": "DBE1BFA6-20EE-44C2-8D48-17CAF2EE2D30" }, { "vulnerable": true, diff --git a/CVE-2013/CVE-2013-07xx/CVE-2013-0759.json b/CVE-2013/CVE-2013-07xx/CVE-2013-0759.json index a1b7a0260ec..19e64ed9dee 100644 --- a/CVE-2013/CVE-2013-07xx/CVE-2013-0759.json +++ b/CVE-2013/CVE-2013-07xx/CVE-2013-0759.json @@ -2,7 +2,7 @@ "id": "CVE-2013-0759", "sourceIdentifier": "security@mozilla.org", "published": "2013-01-13T20:55:02.087", - "lastModified": "2020-08-04T15:31:56.480", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -69,17 +69,17 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "versionStartIncluding": "10.0", "versionEndExcluding": "10.0.12", - "matchCriteriaId": "4AE87F73-5E93-45A2-BE6A-19751DBA7435" + "matchCriteriaId": "BC13B81F-BA13-445C-9352-52C07DE5722C" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "versionStartIncluding": "17.0", "versionEndExcluding": "17.0.2", - "matchCriteriaId": "3CCFC7BF-ABCE-423B-8229-126EC1D6FA10" + "matchCriteriaId": "DBE1BFA6-20EE-44C2-8D48-17CAF2EE2D30" }, { "vulnerable": true, diff --git a/CVE-2013/CVE-2013-07xx/CVE-2013-0760.json b/CVE-2013/CVE-2013-07xx/CVE-2013-0760.json index 6c81768de6e..871722baae0 100644 --- a/CVE-2013/CVE-2013-07xx/CVE-2013-0760.json +++ b/CVE-2013/CVE-2013-07xx/CVE-2013-0760.json @@ -2,7 +2,7 @@ "id": "CVE-2013-0760", "sourceIdentifier": "security@mozilla.org", "published": "2013-01-13T20:55:02.117", - "lastModified": "2020-08-11T20:19:40.740", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -61,6 +61,12 @@ "operator": "OR", "negate": false, "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.11", + "matchCriteriaId": "9D350E7E-4990-4C93-80AD-AC5C27040549" + }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", @@ -69,16 +75,10 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", - "versionEndExcluding": "10.0.11", - "matchCriteriaId": "4E21A0BB-B361-418E-A83B-F5DDDE02324F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "versionStartIncluding": "17.0", "versionEndExcluding": "17.0.2", - "matchCriteriaId": "3CCFC7BF-ABCE-423B-8229-126EC1D6FA10" + "matchCriteriaId": "DBE1BFA6-20EE-44C2-8D48-17CAF2EE2D30" }, { "vulnerable": true, diff --git a/CVE-2013/CVE-2013-07xx/CVE-2013-0761.json b/CVE-2013/CVE-2013-07xx/CVE-2013-0761.json index 46c6ea9ef51..e819f05eb06 100644 --- a/CVE-2013/CVE-2013-07xx/CVE-2013-0761.json +++ b/CVE-2013/CVE-2013-07xx/CVE-2013-0761.json @@ -2,7 +2,7 @@ "id": "CVE-2013-0761", "sourceIdentifier": "security@mozilla.org", "published": "2013-01-13T20:55:02.180", - "lastModified": "2020-08-07T17:52:54.650", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -69,17 +69,17 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "versionStartIncluding": "10.0", "versionEndExcluding": "10.0.12", - "matchCriteriaId": "4AE87F73-5E93-45A2-BE6A-19751DBA7435" + "matchCriteriaId": "BC13B81F-BA13-445C-9352-52C07DE5722C" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "versionStartIncluding": "17.0", "versionEndExcluding": "17.0.2", - "matchCriteriaId": "3CCFC7BF-ABCE-423B-8229-126EC1D6FA10" + "matchCriteriaId": "DBE1BFA6-20EE-44C2-8D48-17CAF2EE2D30" }, { "vulnerable": true, diff --git a/CVE-2013/CVE-2013-07xx/CVE-2013-0762.json b/CVE-2013/CVE-2013-07xx/CVE-2013-0762.json index 90cdfbba4d4..f352e9d86f1 100644 --- a/CVE-2013/CVE-2013-07xx/CVE-2013-0762.json +++ b/CVE-2013/CVE-2013-07xx/CVE-2013-0762.json @@ -2,7 +2,7 @@ "id": "CVE-2013-0762", "sourceIdentifier": "security@mozilla.org", "published": "2013-01-13T20:55:02.227", - "lastModified": "2020-08-04T15:31:25.090", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -69,17 +69,17 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "versionStartIncluding": "10.0", "versionEndExcluding": "10.0.12", - "matchCriteriaId": "4AE87F73-5E93-45A2-BE6A-19751DBA7435" + "matchCriteriaId": "BC13B81F-BA13-445C-9352-52C07DE5722C" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "versionStartIncluding": "17.0", "versionEndExcluding": "17.0.2", - "matchCriteriaId": "3CCFC7BF-ABCE-423B-8229-126EC1D6FA10" + "matchCriteriaId": "DBE1BFA6-20EE-44C2-8D48-17CAF2EE2D30" }, { "vulnerable": true, diff --git a/CVE-2013/CVE-2013-07xx/CVE-2013-0763.json b/CVE-2013/CVE-2013-07xx/CVE-2013-0763.json index 556f740983a..e6788aac751 100644 --- a/CVE-2013/CVE-2013-07xx/CVE-2013-0763.json +++ b/CVE-2013/CVE-2013-07xx/CVE-2013-0763.json @@ -2,7 +2,7 @@ "id": "CVE-2013-0763", "sourceIdentifier": "security@mozilla.org", "published": "2013-01-13T20:55:02.260", - "lastModified": "2020-08-04T15:29:59.197", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -69,17 +69,17 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "versionStartIncluding": "10.0", "versionEndExcluding": "10.0.12", - "matchCriteriaId": "4AE87F73-5E93-45A2-BE6A-19751DBA7435" + "matchCriteriaId": "BC13B81F-BA13-445C-9352-52C07DE5722C" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "versionStartIncluding": "17.0", "versionEndExcluding": "17.0.2", - "matchCriteriaId": "3CCFC7BF-ABCE-423B-8229-126EC1D6FA10" + "matchCriteriaId": "DBE1BFA6-20EE-44C2-8D48-17CAF2EE2D30" }, { "vulnerable": true, diff --git a/CVE-2013/CVE-2013-07xx/CVE-2013-0764.json b/CVE-2013/CVE-2013-07xx/CVE-2013-0764.json index 9d148c89709..44ce00c1b25 100644 --- a/CVE-2013/CVE-2013-07xx/CVE-2013-0764.json +++ b/CVE-2013/CVE-2013-07xx/CVE-2013-0764.json @@ -2,7 +2,7 @@ "id": "CVE-2013-0764", "sourceIdentifier": "security@mozilla.org", "published": "2013-01-13T20:55:02.307", - "lastModified": "2020-08-07T17:54:20.807", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -64,14 +64,14 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", - "versionEndExcluding": "19.0", - "matchCriteriaId": "C2980165-E0D6-43C0-9AB8-C643B25EF6AC" + "versionEndExcluding": "17.0.3", + "matchCriteriaId": "20BB7EC3-4F30-448E-9D8C-E00F0D5832DD" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", - "versionEndExcluding": "17.0.3", - "matchCriteriaId": "907637C3-EAA4-4A46-A996-922240E34504" + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", + "versionEndExcluding": "19.0", + "matchCriteriaId": "C2980165-E0D6-43C0-9AB8-C643B25EF6AC" }, { "vulnerable": true, diff --git a/CVE-2013/CVE-2013-07xx/CVE-2013-0766.json b/CVE-2013/CVE-2013-07xx/CVE-2013-0766.json index 790a5b30959..ae610480811 100644 --- a/CVE-2013/CVE-2013-07xx/CVE-2013-0766.json +++ b/CVE-2013/CVE-2013-07xx/CVE-2013-0766.json @@ -2,7 +2,7 @@ "id": "CVE-2013-0766", "sourceIdentifier": "security@mozilla.org", "published": "2013-01-13T20:55:02.337", - "lastModified": "2020-08-07T18:34:04.147", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -69,17 +69,17 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "versionStartIncluding": "10.0", "versionEndExcluding": "10.0.12", - "matchCriteriaId": "4AE87F73-5E93-45A2-BE6A-19751DBA7435" + "matchCriteriaId": "BC13B81F-BA13-445C-9352-52C07DE5722C" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "versionStartIncluding": "17.0", "versionEndExcluding": "17.0.2", - "matchCriteriaId": "3CCFC7BF-ABCE-423B-8229-126EC1D6FA10" + "matchCriteriaId": "DBE1BFA6-20EE-44C2-8D48-17CAF2EE2D30" }, { "vulnerable": true, diff --git a/CVE-2013/CVE-2013-07xx/CVE-2013-0767.json b/CVE-2013/CVE-2013-07xx/CVE-2013-0767.json index 8b1f1515a30..c77937cfba7 100644 --- a/CVE-2013/CVE-2013-07xx/CVE-2013-0767.json +++ b/CVE-2013/CVE-2013-07xx/CVE-2013-0767.json @@ -2,7 +2,7 @@ "id": "CVE-2013-0767", "sourceIdentifier": "security@mozilla.org", "published": "2013-01-13T20:55:02.383", - "lastModified": "2020-08-07T18:46:19.950", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -69,17 +69,17 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "versionStartIncluding": "10.0", "versionEndExcluding": "10.0.12", - "matchCriteriaId": "4AE87F73-5E93-45A2-BE6A-19751DBA7435" + "matchCriteriaId": "BC13B81F-BA13-445C-9352-52C07DE5722C" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "versionStartIncluding": "17.0", "versionEndExcluding": "17.0.2", - "matchCriteriaId": "3CCFC7BF-ABCE-423B-8229-126EC1D6FA10" + "matchCriteriaId": "DBE1BFA6-20EE-44C2-8D48-17CAF2EE2D30" }, { "vulnerable": true, diff --git a/CVE-2013/CVE-2013-07xx/CVE-2013-0768.json b/CVE-2013/CVE-2013-07xx/CVE-2013-0768.json index 57643dc740a..06cd002f211 100644 --- a/CVE-2013/CVE-2013-07xx/CVE-2013-0768.json +++ b/CVE-2013/CVE-2013-07xx/CVE-2013-0768.json @@ -2,7 +2,7 @@ "id": "CVE-2013-0768", "sourceIdentifier": "security@mozilla.org", "published": "2013-01-13T20:55:02.417", - "lastModified": "2020-08-07T18:48:47.867", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -64,14 +64,14 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", - "versionEndExcluding": "18.0", - "matchCriteriaId": "B79F0682-C77C-4B65-B267-C370CFC70295" + "versionEndExcluding": "17.0.2", + "matchCriteriaId": "FD510D1E-3D09-40F1-88AE-41E830120384" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", - "versionEndExcluding": "17.0.2", - "matchCriteriaId": "155888ED-7B29-4305-86E3-0844B3FE70F3" + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.0", + "matchCriteriaId": "B79F0682-C77C-4B65-B267-C370CFC70295" }, { "vulnerable": true, diff --git a/CVE-2013/CVE-2013-07xx/CVE-2013-0769.json b/CVE-2013/CVE-2013-07xx/CVE-2013-0769.json index fdd57a326e9..4f16c5f8548 100644 --- a/CVE-2013/CVE-2013-07xx/CVE-2013-0769.json +++ b/CVE-2013/CVE-2013-07xx/CVE-2013-0769.json @@ -2,7 +2,7 @@ "id": "CVE-2013-0769", "sourceIdentifier": "security@mozilla.org", "published": "2013-01-13T20:55:02.463", - "lastModified": "2020-08-11T13:09:53.190", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -69,17 +69,17 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "versionStartIncluding": "10.0", "versionEndExcluding": "10.0.12", - "matchCriteriaId": "4AE87F73-5E93-45A2-BE6A-19751DBA7435" + "matchCriteriaId": "BC13B81F-BA13-445C-9352-52C07DE5722C" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "versionStartIncluding": "17.0", "versionEndExcluding": "17.0.2", - "matchCriteriaId": "3CCFC7BF-ABCE-423B-8229-126EC1D6FA10" + "matchCriteriaId": "DBE1BFA6-20EE-44C2-8D48-17CAF2EE2D30" }, { "vulnerable": true, diff --git a/CVE-2013/CVE-2013-07xx/CVE-2013-0770.json b/CVE-2013/CVE-2013-07xx/CVE-2013-0770.json index 4b377c632d5..f084046c94f 100644 --- a/CVE-2013/CVE-2013-07xx/CVE-2013-0770.json +++ b/CVE-2013/CVE-2013-07xx/CVE-2013-0770.json @@ -2,7 +2,7 @@ "id": "CVE-2013-0770", "sourceIdentifier": "security@mozilla.org", "published": "2013-01-13T20:55:02.510", - "lastModified": "2020-08-12T12:53:30.017", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -61,6 +61,12 @@ "operator": "OR", "negate": false, "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.12", + "matchCriteriaId": "45FC91FC-214D-4A95-BE1F-9353C3E2E0B1" + }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", @@ -69,16 +75,10 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", - "versionEndExcluding": "10.0.12", - "matchCriteriaId": "F274CEEE-F1A9-4A53-A356-AFA98995030A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "versionStartIncluding": "17.0", "versionEndExcluding": "17.0.2", - "matchCriteriaId": "3CCFC7BF-ABCE-423B-8229-126EC1D6FA10" + "matchCriteriaId": "DBE1BFA6-20EE-44C2-8D48-17CAF2EE2D30" }, { "vulnerable": true, diff --git a/CVE-2013/CVE-2013-07xx/CVE-2013-0771.json b/CVE-2013/CVE-2013-07xx/CVE-2013-0771.json index 14f70c0a623..20b937dd972 100644 --- a/CVE-2013/CVE-2013-07xx/CVE-2013-0771.json +++ b/CVE-2013/CVE-2013-07xx/CVE-2013-0771.json @@ -2,7 +2,7 @@ "id": "CVE-2013-0771", "sourceIdentifier": "security@mozilla.org", "published": "2013-01-13T20:55:02.557", - "lastModified": "2020-08-11T13:14:07.470", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -69,17 +69,17 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "versionStartIncluding": "10.0", "versionEndExcluding": "10.0.12", - "matchCriteriaId": "4AE87F73-5E93-45A2-BE6A-19751DBA7435" + "matchCriteriaId": "BC13B81F-BA13-445C-9352-52C07DE5722C" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "versionStartIncluding": "17.0", "versionEndExcluding": "17.0.2", - "matchCriteriaId": "3CCFC7BF-ABCE-423B-8229-126EC1D6FA10" + "matchCriteriaId": "DBE1BFA6-20EE-44C2-8D48-17CAF2EE2D30" }, { "vulnerable": true, diff --git a/CVE-2013/CVE-2013-07xx/CVE-2013-0773.json b/CVE-2013/CVE-2013-07xx/CVE-2013-0773.json index 5bef4acd6ed..9ddb5c0a053 100644 --- a/CVE-2013/CVE-2013-07xx/CVE-2013-0773.json +++ b/CVE-2013/CVE-2013-07xx/CVE-2013-0773.json @@ -2,7 +2,7 @@ "id": "CVE-2013-0773", "sourceIdentifier": "security@mozilla.org", "published": "2013-02-19T23:55:01.397", - "lastModified": "2020-08-06T16:34:18.907", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -64,14 +64,14 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", - "versionEndExcluding": "19.0", - "matchCriteriaId": "C2980165-E0D6-43C0-9AB8-C643B25EF6AC" + "versionEndExcluding": "17.0.3", + "matchCriteriaId": "20BB7EC3-4F30-448E-9D8C-E00F0D5832DD" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", - "versionEndExcluding": "17.0.3", - "matchCriteriaId": "907637C3-EAA4-4A46-A996-922240E34504" + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", + "versionEndExcluding": "19.0", + "matchCriteriaId": "C2980165-E0D6-43C0-9AB8-C643B25EF6AC" }, { "vulnerable": true, diff --git a/CVE-2013/CVE-2013-07xx/CVE-2013-0774.json b/CVE-2013/CVE-2013-07xx/CVE-2013-0774.json index 30d6fd9ba32..6d27e8fd735 100644 --- a/CVE-2013/CVE-2013-07xx/CVE-2013-0774.json +++ b/CVE-2013/CVE-2013-07xx/CVE-2013-0774.json @@ -2,7 +2,7 @@ "id": "CVE-2013-0774", "sourceIdentifier": "security@mozilla.org", "published": "2013-02-19T23:55:01.457", - "lastModified": "2020-08-06T16:40:01.707", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -64,14 +64,14 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", - "versionEndExcluding": "19.0", - "matchCriteriaId": "C2980165-E0D6-43C0-9AB8-C643B25EF6AC" + "versionEndExcluding": "17.0.3", + "matchCriteriaId": "20BB7EC3-4F30-448E-9D8C-E00F0D5832DD" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", - "versionEndExcluding": "17.0.3", - "matchCriteriaId": "907637C3-EAA4-4A46-A996-922240E34504" + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", + "versionEndExcluding": "19.0", + "matchCriteriaId": "C2980165-E0D6-43C0-9AB8-C643B25EF6AC" }, { "vulnerable": true, diff --git a/CVE-2013/CVE-2013-07xx/CVE-2013-0775.json b/CVE-2013/CVE-2013-07xx/CVE-2013-0775.json index ddf568d6868..496e58a3877 100644 --- a/CVE-2013/CVE-2013-07xx/CVE-2013-0775.json +++ b/CVE-2013/CVE-2013-07xx/CVE-2013-0775.json @@ -2,7 +2,7 @@ "id": "CVE-2013-0775", "sourceIdentifier": "security@mozilla.org", "published": "2013-02-19T23:55:01.503", - "lastModified": "2020-08-06T16:41:57.163", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -64,14 +64,14 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", - "versionEndExcluding": "19.0", - "matchCriteriaId": "C2980165-E0D6-43C0-9AB8-C643B25EF6AC" + "versionEndExcluding": "17.0.3", + "matchCriteriaId": "20BB7EC3-4F30-448E-9D8C-E00F0D5832DD" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", - "versionEndExcluding": "17.0.3", - "matchCriteriaId": "907637C3-EAA4-4A46-A996-922240E34504" + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", + "versionEndExcluding": "19.0", + "matchCriteriaId": "C2980165-E0D6-43C0-9AB8-C643B25EF6AC" }, { "vulnerable": true, diff --git a/CVE-2013/CVE-2013-07xx/CVE-2013-0776.json b/CVE-2013/CVE-2013-07xx/CVE-2013-0776.json index 595d8193690..fecc8f9b2d0 100644 --- a/CVE-2013/CVE-2013-07xx/CVE-2013-0776.json +++ b/CVE-2013/CVE-2013-07xx/CVE-2013-0776.json @@ -2,7 +2,7 @@ "id": "CVE-2013-0776", "sourceIdentifier": "security@mozilla.org", "published": "2013-02-19T23:55:01.550", - "lastModified": "2020-08-06T16:47:24.600", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -64,14 +64,14 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", - "versionEndExcluding": "19.0", - "matchCriteriaId": "C2980165-E0D6-43C0-9AB8-C643B25EF6AC" + "versionEndExcluding": "17.0.3", + "matchCriteriaId": "20BB7EC3-4F30-448E-9D8C-E00F0D5832DD" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", - "versionEndExcluding": "17.0.3", - "matchCriteriaId": "907637C3-EAA4-4A46-A996-922240E34504" + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", + "versionEndExcluding": "19.0", + "matchCriteriaId": "C2980165-E0D6-43C0-9AB8-C643B25EF6AC" }, { "vulnerable": true, diff --git a/CVE-2013/CVE-2013-07xx/CVE-2013-0777.json b/CVE-2013/CVE-2013-07xx/CVE-2013-0777.json index e9d0a2f07e0..1d4b10a7104 100644 --- a/CVE-2013/CVE-2013-07xx/CVE-2013-0777.json +++ b/CVE-2013/CVE-2013-07xx/CVE-2013-0777.json @@ -2,7 +2,7 @@ "id": "CVE-2013-0777", "sourceIdentifier": "security@mozilla.org", "published": "2013-02-19T23:55:01.597", - "lastModified": "2020-08-06T16:48:08.180", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -64,14 +64,14 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", - "versionEndExcluding": "19.0", - "matchCriteriaId": "C2980165-E0D6-43C0-9AB8-C643B25EF6AC" + "versionEndExcluding": "17.0.3", + "matchCriteriaId": "20BB7EC3-4F30-448E-9D8C-E00F0D5832DD" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", - "versionEndExcluding": "17.0.3", - "matchCriteriaId": "907637C3-EAA4-4A46-A996-922240E34504" + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", + "versionEndExcluding": "19.0", + "matchCriteriaId": "C2980165-E0D6-43C0-9AB8-C643B25EF6AC" }, { "vulnerable": true, diff --git a/CVE-2013/CVE-2013-07xx/CVE-2013-0778.json b/CVE-2013/CVE-2013-07xx/CVE-2013-0778.json index b60fbdcc8dc..8e318e5fdd9 100644 --- a/CVE-2013/CVE-2013-07xx/CVE-2013-0778.json +++ b/CVE-2013/CVE-2013-07xx/CVE-2013-0778.json @@ -2,7 +2,7 @@ "id": "CVE-2013-0778", "sourceIdentifier": "security@mozilla.org", "published": "2013-02-19T23:55:01.647", - "lastModified": "2020-08-06T16:58:03.217", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -64,14 +64,14 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", - "versionEndExcluding": "19.0", - "matchCriteriaId": "C2980165-E0D6-43C0-9AB8-C643B25EF6AC" + "versionEndExcluding": "17.0.3", + "matchCriteriaId": "20BB7EC3-4F30-448E-9D8C-E00F0D5832DD" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", - "versionEndExcluding": "17.0.3", - "matchCriteriaId": "907637C3-EAA4-4A46-A996-922240E34504" + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", + "versionEndExcluding": "19.0", + "matchCriteriaId": "C2980165-E0D6-43C0-9AB8-C643B25EF6AC" }, { "vulnerable": true, diff --git a/CVE-2013/CVE-2013-07xx/CVE-2013-0779.json b/CVE-2013/CVE-2013-07xx/CVE-2013-0779.json index 065df02511c..83258e5f7ee 100644 --- a/CVE-2013/CVE-2013-07xx/CVE-2013-0779.json +++ b/CVE-2013/CVE-2013-07xx/CVE-2013-0779.json @@ -2,7 +2,7 @@ "id": "CVE-2013-0779", "sourceIdentifier": "security@mozilla.org", "published": "2013-02-19T23:55:01.693", - "lastModified": "2020-08-06T17:06:53.653", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -64,14 +64,14 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", - "versionEndExcluding": "19.0", - "matchCriteriaId": "C2980165-E0D6-43C0-9AB8-C643B25EF6AC" + "versionEndExcluding": "17.0.3", + "matchCriteriaId": "20BB7EC3-4F30-448E-9D8C-E00F0D5832DD" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", - "versionEndExcluding": "17.0.3", - "matchCriteriaId": "907637C3-EAA4-4A46-A996-922240E34504" + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", + "versionEndExcluding": "19.0", + "matchCriteriaId": "C2980165-E0D6-43C0-9AB8-C643B25EF6AC" }, { "vulnerable": true, diff --git a/CVE-2013/CVE-2013-07xx/CVE-2013-0780.json b/CVE-2013/CVE-2013-07xx/CVE-2013-0780.json index 5ef6825e738..bde3e61f2b0 100644 --- a/CVE-2013/CVE-2013-07xx/CVE-2013-0780.json +++ b/CVE-2013/CVE-2013-07xx/CVE-2013-0780.json @@ -2,7 +2,7 @@ "id": "CVE-2013-0780", "sourceIdentifier": "security@mozilla.org", "published": "2013-02-19T23:55:01.723", - "lastModified": "2020-08-06T17:10:56.663", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -64,14 +64,14 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", - "versionEndExcluding": "19.0", - "matchCriteriaId": "C2980165-E0D6-43C0-9AB8-C643B25EF6AC" + "versionEndExcluding": "17.0.3", + "matchCriteriaId": "20BB7EC3-4F30-448E-9D8C-E00F0D5832DD" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", - "versionEndExcluding": "17.0.3", - "matchCriteriaId": "907637C3-EAA4-4A46-A996-922240E34504" + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", + "versionEndExcluding": "19.0", + "matchCriteriaId": "C2980165-E0D6-43C0-9AB8-C643B25EF6AC" }, { "vulnerable": true, diff --git a/CVE-2013/CVE-2013-07xx/CVE-2013-0781.json b/CVE-2013/CVE-2013-07xx/CVE-2013-0781.json index 4c8270cb891..d4c674f8a6a 100644 --- a/CVE-2013/CVE-2013-07xx/CVE-2013-0781.json +++ b/CVE-2013/CVE-2013-07xx/CVE-2013-0781.json @@ -2,7 +2,7 @@ "id": "CVE-2013-0781", "sourceIdentifier": "security@mozilla.org", "published": "2013-02-19T23:55:01.770", - "lastModified": "2020-08-06T17:11:41.867", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -64,14 +64,14 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", - "versionEndExcluding": "19.0", - "matchCriteriaId": "C2980165-E0D6-43C0-9AB8-C643B25EF6AC" + "versionEndExcluding": "17.0.3", + "matchCriteriaId": "20BB7EC3-4F30-448E-9D8C-E00F0D5832DD" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", - "versionEndExcluding": "17.0.3", - "matchCriteriaId": "907637C3-EAA4-4A46-A996-922240E34504" + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", + "versionEndExcluding": "19.0", + "matchCriteriaId": "C2980165-E0D6-43C0-9AB8-C643B25EF6AC" }, { "vulnerable": true, diff --git a/CVE-2013/CVE-2013-07xx/CVE-2013-0782.json b/CVE-2013/CVE-2013-07xx/CVE-2013-0782.json index 40440e59a2e..b4e7ac39353 100644 --- a/CVE-2013/CVE-2013-07xx/CVE-2013-0782.json +++ b/CVE-2013/CVE-2013-07xx/CVE-2013-0782.json @@ -2,7 +2,7 @@ "id": "CVE-2013-0782", "sourceIdentifier": "security@mozilla.org", "published": "2013-02-19T23:55:01.817", - "lastModified": "2020-08-06T17:14:28.190", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -64,14 +64,14 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", - "versionEndExcluding": "19.0", - "matchCriteriaId": "C2980165-E0D6-43C0-9AB8-C643B25EF6AC" + "versionEndExcluding": "17.0.3", + "matchCriteriaId": "20BB7EC3-4F30-448E-9D8C-E00F0D5832DD" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", - "versionEndExcluding": "17.0.3", - "matchCriteriaId": "907637C3-EAA4-4A46-A996-922240E34504" + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", + "versionEndExcluding": "19.0", + "matchCriteriaId": "C2980165-E0D6-43C0-9AB8-C643B25EF6AC" }, { "vulnerable": true, diff --git a/CVE-2013/CVE-2013-07xx/CVE-2013-0783.json b/CVE-2013/CVE-2013-07xx/CVE-2013-0783.json index bb08fdfc94f..f9f10705b79 100644 --- a/CVE-2013/CVE-2013-07xx/CVE-2013-0783.json +++ b/CVE-2013/CVE-2013-07xx/CVE-2013-0783.json @@ -2,7 +2,7 @@ "id": "CVE-2013-0783", "sourceIdentifier": "security@mozilla.org", "published": "2013-02-19T23:55:01.863", - "lastModified": "2020-08-06T17:24:47.450", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -64,14 +64,14 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", - "versionEndExcluding": "19.0", - "matchCriteriaId": "C2980165-E0D6-43C0-9AB8-C643B25EF6AC" + "versionEndExcluding": "17.0.3", + "matchCriteriaId": "20BB7EC3-4F30-448E-9D8C-E00F0D5832DD" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", - "versionEndExcluding": "17.0.3", - "matchCriteriaId": "907637C3-EAA4-4A46-A996-922240E34504" + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", + "versionEndExcluding": "19.0", + "matchCriteriaId": "C2980165-E0D6-43C0-9AB8-C643B25EF6AC" }, { "vulnerable": true, diff --git a/CVE-2013/CVE-2013-07xx/CVE-2013-0784.json b/CVE-2013/CVE-2013-07xx/CVE-2013-0784.json index c4622ff196e..3dd0c4c37da 100644 --- a/CVE-2013/CVE-2013-07xx/CVE-2013-0784.json +++ b/CVE-2013/CVE-2013-07xx/CVE-2013-0784.json @@ -2,7 +2,7 @@ "id": "CVE-2013-0784", "sourceIdentifier": "security@mozilla.org", "published": "2013-02-19T23:55:01.927", - "lastModified": "2020-08-06T17:29:08.507", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -64,14 +64,14 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", - "versionEndExcluding": "19.0", - "matchCriteriaId": "C2980165-E0D6-43C0-9AB8-C643B25EF6AC" + "versionEndExcluding": "17.0.3", + "matchCriteriaId": "20BB7EC3-4F30-448E-9D8C-E00F0D5832DD" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", - "versionEndExcluding": "17.0.3", - "matchCriteriaId": "907637C3-EAA4-4A46-A996-922240E34504" + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", + "versionEndExcluding": "19.0", + "matchCriteriaId": "C2980165-E0D6-43C0-9AB8-C643B25EF6AC" }, { "vulnerable": true, diff --git a/CVE-2013/CVE-2013-07xx/CVE-2013-0787.json b/CVE-2013/CVE-2013-07xx/CVE-2013-0787.json index 12547bf74e4..9bd15f7d2e1 100644 --- a/CVE-2013/CVE-2013-07xx/CVE-2013-0787.json +++ b/CVE-2013/CVE-2013-07xx/CVE-2013-0787.json @@ -2,7 +2,7 @@ "id": "CVE-2013-0787", "sourceIdentifier": "security@mozilla.org", "published": "2013-03-11T10:55:00.990", - "lastModified": "2017-09-19T01:35:50.497", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -84,23 +84,23 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0:*:*:*:*:*:*:*", - "matchCriteriaId": "D9BBC7F8-D102-403F-8A88-AF279536E2F0" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0:*:*:*:*:*:*:*", + "matchCriteriaId": "3283FBAC-B77A-4C62-9D51-70BB35FA3D13" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "DFDAC701-5E69-4633-8CE4-04B8AFCC10C2" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "886D8A1F-ECDD-4FE9-A4E5-2322EEC0B880" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "83D5CFC4-C5DD-4747-985A-BC7A8E7C6EF7" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "E10B8803-C319-4AAA-81CF-FA206A33BA55" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.3:*:*:*:*:*:*:*", - "matchCriteriaId": "D5AFA78C-71F3-4E64-8A8F-5BA028F04037" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.3:*:*:*:*:*:*:*", + "matchCriteriaId": "E2B5567C-8969-456D-B6DF-3562B99C41FE" } ] } diff --git a/CVE-2013/CVE-2013-07xx/CVE-2013-0788.json b/CVE-2013/CVE-2013-07xx/CVE-2013-0788.json index f4215cb6401..34504d215b0 100644 --- a/CVE-2013/CVE-2013-07xx/CVE-2013-0788.json +++ b/CVE-2013/CVE-2013-07xx/CVE-2013-0788.json @@ -2,7 +2,7 @@ "id": "CVE-2013-0788", "sourceIdentifier": "security@mozilla.org", "published": "2013-04-03T11:56:21.027", - "lastModified": "2017-09-19T01:35:50.577", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -89,28 +89,28 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0:*:*:*:*:*:*:*", - "matchCriteriaId": "D9BBC7F8-D102-403F-8A88-AF279536E2F0" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0:*:*:*:*:*:*:*", + "matchCriteriaId": "3283FBAC-B77A-4C62-9D51-70BB35FA3D13" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "DFDAC701-5E69-4633-8CE4-04B8AFCC10C2" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "886D8A1F-ECDD-4FE9-A4E5-2322EEC0B880" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "83D5CFC4-C5DD-4747-985A-BC7A8E7C6EF7" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "E10B8803-C319-4AAA-81CF-FA206A33BA55" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.3:*:*:*:*:*:*:*", - "matchCriteriaId": "D5AFA78C-71F3-4E64-8A8F-5BA028F04037" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.3:*:*:*:*:*:*:*", + "matchCriteriaId": "E2B5567C-8969-456D-B6DF-3562B99C41FE" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.4:*:*:*:*:*:*:*", - "matchCriteriaId": "F99963C6-175B-4099-86F4-BADCA43DB41F" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.4:*:*:*:*:*:*:*", + "matchCriteriaId": "5657779C-19F9-42B8-BBBD-292B898E8FD2" } ] } diff --git a/CVE-2013/CVE-2013-07xx/CVE-2013-0791.json b/CVE-2013/CVE-2013-07xx/CVE-2013-0791.json index 75c51cd3a04..2a07ed8d67c 100644 --- a/CVE-2013/CVE-2013-07xx/CVE-2013-0791.json +++ b/CVE-2013/CVE-2013-07xx/CVE-2013-0791.json @@ -2,7 +2,7 @@ "id": "CVE-2013-0791", "sourceIdentifier": "security@mozilla.org", "published": "2013-04-03T11:56:21.117", - "lastModified": "2022-12-21T16:17:37.553", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -69,10 +69,10 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "versionStartIncluding": "17.0", "versionEndExcluding": "17.0.5", - "matchCriteriaId": "D233DB53-44EA-4198-B691-7AA0579AF4A8" + "matchCriteriaId": "36586226-AE60-4DB6-8F41-CA2A02778F53" }, { "vulnerable": true, diff --git a/CVE-2013/CVE-2013-07xx/CVE-2013-0793.json b/CVE-2013/CVE-2013-07xx/CVE-2013-0793.json index 80edc3036cc..072d5a6f71d 100644 --- a/CVE-2013/CVE-2013-07xx/CVE-2013-0793.json +++ b/CVE-2013/CVE-2013-07xx/CVE-2013-0793.json @@ -2,7 +2,7 @@ "id": "CVE-2013-0793", "sourceIdentifier": "security@mozilla.org", "published": "2013-04-03T11:56:21.150", - "lastModified": "2017-09-19T01:35:50.933", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -89,28 +89,28 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0:*:*:*:*:*:*:*", - "matchCriteriaId": "D9BBC7F8-D102-403F-8A88-AF279536E2F0" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0:*:*:*:*:*:*:*", + "matchCriteriaId": "3283FBAC-B77A-4C62-9D51-70BB35FA3D13" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "DFDAC701-5E69-4633-8CE4-04B8AFCC10C2" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "886D8A1F-ECDD-4FE9-A4E5-2322EEC0B880" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "83D5CFC4-C5DD-4747-985A-BC7A8E7C6EF7" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "E10B8803-C319-4AAA-81CF-FA206A33BA55" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.3:*:*:*:*:*:*:*", - "matchCriteriaId": "D5AFA78C-71F3-4E64-8A8F-5BA028F04037" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.3:*:*:*:*:*:*:*", + "matchCriteriaId": "E2B5567C-8969-456D-B6DF-3562B99C41FE" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.4:*:*:*:*:*:*:*", - "matchCriteriaId": "F99963C6-175B-4099-86F4-BADCA43DB41F" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.4:*:*:*:*:*:*:*", + "matchCriteriaId": "5657779C-19F9-42B8-BBBD-292B898E8FD2" } ] } diff --git a/CVE-2013/CVE-2013-07xx/CVE-2013-0795.json b/CVE-2013/CVE-2013-07xx/CVE-2013-0795.json index ab7523bcd59..ee016f2011c 100644 --- a/CVE-2013/CVE-2013-07xx/CVE-2013-0795.json +++ b/CVE-2013/CVE-2013-07xx/CVE-2013-0795.json @@ -2,7 +2,7 @@ "id": "CVE-2013-0795", "sourceIdentifier": "security@mozilla.org", "published": "2013-04-03T11:56:21.197", - "lastModified": "2017-09-19T01:35:51.107", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -89,28 +89,28 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0:*:*:*:*:*:*:*", - "matchCriteriaId": "D9BBC7F8-D102-403F-8A88-AF279536E2F0" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0:*:*:*:*:*:*:*", + "matchCriteriaId": "3283FBAC-B77A-4C62-9D51-70BB35FA3D13" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "DFDAC701-5E69-4633-8CE4-04B8AFCC10C2" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "886D8A1F-ECDD-4FE9-A4E5-2322EEC0B880" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "83D5CFC4-C5DD-4747-985A-BC7A8E7C6EF7" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "E10B8803-C319-4AAA-81CF-FA206A33BA55" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.3:*:*:*:*:*:*:*", - "matchCriteriaId": "D5AFA78C-71F3-4E64-8A8F-5BA028F04037" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.3:*:*:*:*:*:*:*", + "matchCriteriaId": "E2B5567C-8969-456D-B6DF-3562B99C41FE" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.4:*:*:*:*:*:*:*", - "matchCriteriaId": "F99963C6-175B-4099-86F4-BADCA43DB41F" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.4:*:*:*:*:*:*:*", + "matchCriteriaId": "5657779C-19F9-42B8-BBBD-292B898E8FD2" } ] } diff --git a/CVE-2013/CVE-2013-07xx/CVE-2013-0796.json b/CVE-2013/CVE-2013-07xx/CVE-2013-0796.json index a41f63b570b..f5c37a1ddc6 100644 --- a/CVE-2013/CVE-2013-07xx/CVE-2013-0796.json +++ b/CVE-2013/CVE-2013-07xx/CVE-2013-0796.json @@ -2,7 +2,7 @@ "id": "CVE-2013-0796", "sourceIdentifier": "security@mozilla.org", "published": "2013-04-03T11:56:21.217", - "lastModified": "2023-01-19T02:41:50.103", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -92,10 +92,10 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "versionStartIncluding": "17.0", "versionEndExcluding": "17.0.5", - "matchCriteriaId": "D233DB53-44EA-4198-B691-7AA0579AF4A8" + "matchCriteriaId": "36586226-AE60-4DB6-8F41-CA2A02778F53" } ] }, diff --git a/CVE-2013/CVE-2013-07xx/CVE-2013-0797.json b/CVE-2013/CVE-2013-07xx/CVE-2013-0797.json index ef0a2491b1c..e957a291419 100644 --- a/CVE-2013/CVE-2013-07xx/CVE-2013-0797.json +++ b/CVE-2013/CVE-2013-07xx/CVE-2013-0797.json @@ -2,7 +2,7 @@ "id": "CVE-2013-0797", "sourceIdentifier": "security@mozilla.org", "published": "2013-04-03T11:56:21.237", - "lastModified": "2017-09-19T01:35:51.187", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "evaluatorComment": "Per: http://cwe.mitre.org/data/definitions/426.html\r\n\r\n'CWE-426: Untrusted Search Path'", @@ -90,28 +90,28 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0:*:*:*:*:*:*:*", - "matchCriteriaId": "D9BBC7F8-D102-403F-8A88-AF279536E2F0" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0:*:*:*:*:*:*:*", + "matchCriteriaId": "3283FBAC-B77A-4C62-9D51-70BB35FA3D13" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "DFDAC701-5E69-4633-8CE4-04B8AFCC10C2" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "886D8A1F-ECDD-4FE9-A4E5-2322EEC0B880" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "83D5CFC4-C5DD-4747-985A-BC7A8E7C6EF7" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "E10B8803-C319-4AAA-81CF-FA206A33BA55" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.3:*:*:*:*:*:*:*", - "matchCriteriaId": "D5AFA78C-71F3-4E64-8A8F-5BA028F04037" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.3:*:*:*:*:*:*:*", + "matchCriteriaId": "E2B5567C-8969-456D-B6DF-3562B99C41FE" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.4:*:*:*:*:*:*:*", - "matchCriteriaId": "F99963C6-175B-4099-86F4-BADCA43DB41F" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.4:*:*:*:*:*:*:*", + "matchCriteriaId": "5657779C-19F9-42B8-BBBD-292B898E8FD2" } ] } diff --git a/CVE-2013/CVE-2013-07xx/CVE-2013-0799.json b/CVE-2013/CVE-2013-07xx/CVE-2013-0799.json index 5a3a1b19702..e156eb69b5c 100644 --- a/CVE-2013/CVE-2013-07xx/CVE-2013-0799.json +++ b/CVE-2013/CVE-2013-07xx/CVE-2013-0799.json @@ -2,7 +2,7 @@ "id": "CVE-2013-0799", "sourceIdentifier": "security@mozilla.org", "published": "2013-04-03T11:56:21.277", - "lastModified": "2017-09-19T01:35:51.263", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -102,28 +102,28 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0:*:*:*:*:*:*:*", - "matchCriteriaId": "D9BBC7F8-D102-403F-8A88-AF279536E2F0" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0:*:*:*:*:*:*:*", + "matchCriteriaId": "3283FBAC-B77A-4C62-9D51-70BB35FA3D13" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "DFDAC701-5E69-4633-8CE4-04B8AFCC10C2" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "886D8A1F-ECDD-4FE9-A4E5-2322EEC0B880" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "83D5CFC4-C5DD-4747-985A-BC7A8E7C6EF7" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "E10B8803-C319-4AAA-81CF-FA206A33BA55" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.3:*:*:*:*:*:*:*", - "matchCriteriaId": "D5AFA78C-71F3-4E64-8A8F-5BA028F04037" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.3:*:*:*:*:*:*:*", + "matchCriteriaId": "E2B5567C-8969-456D-B6DF-3562B99C41FE" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.4:*:*:*:*:*:*:*", - "matchCriteriaId": "F99963C6-175B-4099-86F4-BADCA43DB41F" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.4:*:*:*:*:*:*:*", + "matchCriteriaId": "5657779C-19F9-42B8-BBBD-292B898E8FD2" } ] }, diff --git a/CVE-2013/CVE-2013-08xx/CVE-2013-0800.json b/CVE-2013/CVE-2013-08xx/CVE-2013-0800.json index d6433c92078..fdafc13df23 100644 --- a/CVE-2013/CVE-2013-08xx/CVE-2013-0800.json +++ b/CVE-2013/CVE-2013-08xx/CVE-2013-0800.json @@ -2,7 +2,7 @@ "id": "CVE-2013-0800", "sourceIdentifier": "security@mozilla.org", "published": "2013-04-03T11:56:21.293", - "lastModified": "2021-03-11T15:35:13.273", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -69,10 +69,10 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "versionStartIncluding": "17.0", "versionEndExcluding": "17.0.5", - "matchCriteriaId": "D233DB53-44EA-4198-B691-7AA0579AF4A8" + "matchCriteriaId": "36586226-AE60-4DB6-8F41-CA2A02778F53" }, { "vulnerable": true, diff --git a/CVE-2013/CVE-2013-08xx/CVE-2013-0801.json b/CVE-2013/CVE-2013-08xx/CVE-2013-0801.json index 4fa0132a8b6..703fd5fa8cc 100644 --- a/CVE-2013/CVE-2013-08xx/CVE-2013-0801.json +++ b/CVE-2013/CVE-2013-08xx/CVE-2013-0801.json @@ -2,7 +2,7 @@ "id": "CVE-2013-0801", "sourceIdentifier": "security@mozilla.org", "published": "2013-05-16T11:45:30.633", - "lastModified": "2017-09-19T01:35:51.467", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -99,33 +99,33 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0:*:*:*:*:*:*:*", - "matchCriteriaId": "D9BBC7F8-D102-403F-8A88-AF279536E2F0" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0:*:*:*:*:*:*:*", + "matchCriteriaId": "3283FBAC-B77A-4C62-9D51-70BB35FA3D13" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "DFDAC701-5E69-4633-8CE4-04B8AFCC10C2" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "886D8A1F-ECDD-4FE9-A4E5-2322EEC0B880" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "83D5CFC4-C5DD-4747-985A-BC7A8E7C6EF7" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "E10B8803-C319-4AAA-81CF-FA206A33BA55" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.3:*:*:*:*:*:*:*", - "matchCriteriaId": "D5AFA78C-71F3-4E64-8A8F-5BA028F04037" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.3:*:*:*:*:*:*:*", + "matchCriteriaId": "E2B5567C-8969-456D-B6DF-3562B99C41FE" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.4:*:*:*:*:*:*:*", - "matchCriteriaId": "F99963C6-175B-4099-86F4-BADCA43DB41F" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.4:*:*:*:*:*:*:*", + "matchCriteriaId": "5657779C-19F9-42B8-BBBD-292B898E8FD2" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.5:*:*:*:*:*:*:*", - "matchCriteriaId": "96530DB0-8A9E-48FD-A5C5-28FD467568B2" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.5:*:*:*:*:*:*:*", + "matchCriteriaId": "EEA3B9F4-BD8E-488B-A362-0B86BC6DA275" } ] } diff --git a/CVE-2013/CVE-2013-16xx/CVE-2013-1670.json b/CVE-2013/CVE-2013-16xx/CVE-2013-1670.json index bb79473a488..fa4444e4df6 100644 --- a/CVE-2013/CVE-2013-16xx/CVE-2013-1670.json +++ b/CVE-2013/CVE-2013-16xx/CVE-2013-1670.json @@ -2,7 +2,7 @@ "id": "CVE-2013-1670", "sourceIdentifier": "security@mozilla.org", "published": "2013-05-16T11:45:30.777", - "lastModified": "2017-09-19T01:36:09.560", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -103,33 +103,33 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0:*:*:*:*:*:*:*", - "matchCriteriaId": "D9BBC7F8-D102-403F-8A88-AF279536E2F0" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0:*:*:*:*:*:*:*", + "matchCriteriaId": "3283FBAC-B77A-4C62-9D51-70BB35FA3D13" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "DFDAC701-5E69-4633-8CE4-04B8AFCC10C2" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "886D8A1F-ECDD-4FE9-A4E5-2322EEC0B880" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "83D5CFC4-C5DD-4747-985A-BC7A8E7C6EF7" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "E10B8803-C319-4AAA-81CF-FA206A33BA55" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.3:*:*:*:*:*:*:*", - "matchCriteriaId": "D5AFA78C-71F3-4E64-8A8F-5BA028F04037" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.3:*:*:*:*:*:*:*", + "matchCriteriaId": "E2B5567C-8969-456D-B6DF-3562B99C41FE" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.4:*:*:*:*:*:*:*", - "matchCriteriaId": "F99963C6-175B-4099-86F4-BADCA43DB41F" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.4:*:*:*:*:*:*:*", + "matchCriteriaId": "5657779C-19F9-42B8-BBBD-292B898E8FD2" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.5:*:*:*:*:*:*:*", - "matchCriteriaId": "96530DB0-8A9E-48FD-A5C5-28FD467568B2" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.5:*:*:*:*:*:*:*", + "matchCriteriaId": "EEA3B9F4-BD8E-488B-A362-0B86BC6DA275" } ] } diff --git a/CVE-2013/CVE-2013-16xx/CVE-2013-1672.json b/CVE-2013/CVE-2013-16xx/CVE-2013-1672.json index a99fb79a9ac..d2f2736d17b 100644 --- a/CVE-2013/CVE-2013-16xx/CVE-2013-1672.json +++ b/CVE-2013/CVE-2013-16xx/CVE-2013-1672.json @@ -2,7 +2,7 @@ "id": "CVE-2013-1672", "sourceIdentifier": "security@mozilla.org", "published": "2013-05-16T11:45:30.817", - "lastModified": "2017-09-19T01:36:09.700", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -112,33 +112,33 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0:*:*:*:*:*:*:*", - "matchCriteriaId": "D9BBC7F8-D102-403F-8A88-AF279536E2F0" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0:*:*:*:*:*:*:*", + "matchCriteriaId": "3283FBAC-B77A-4C62-9D51-70BB35FA3D13" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "DFDAC701-5E69-4633-8CE4-04B8AFCC10C2" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "886D8A1F-ECDD-4FE9-A4E5-2322EEC0B880" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "83D5CFC4-C5DD-4747-985A-BC7A8E7C6EF7" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "E10B8803-C319-4AAA-81CF-FA206A33BA55" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.3:*:*:*:*:*:*:*", - "matchCriteriaId": "D5AFA78C-71F3-4E64-8A8F-5BA028F04037" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.3:*:*:*:*:*:*:*", + "matchCriteriaId": "E2B5567C-8969-456D-B6DF-3562B99C41FE" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.4:*:*:*:*:*:*:*", - "matchCriteriaId": "F99963C6-175B-4099-86F4-BADCA43DB41F" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.4:*:*:*:*:*:*:*", + "matchCriteriaId": "5657779C-19F9-42B8-BBBD-292B898E8FD2" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.5:*:*:*:*:*:*:*", - "matchCriteriaId": "96530DB0-8A9E-48FD-A5C5-28FD467568B2" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.5:*:*:*:*:*:*:*", + "matchCriteriaId": "EEA3B9F4-BD8E-488B-A362-0B86BC6DA275" } ] }, diff --git a/CVE-2013/CVE-2013-16xx/CVE-2013-1674.json b/CVE-2013/CVE-2013-16xx/CVE-2013-1674.json index f6e6b64d04a..70a3d72d46c 100644 --- a/CVE-2013/CVE-2013-16xx/CVE-2013-1674.json +++ b/CVE-2013/CVE-2013-16xx/CVE-2013-1674.json @@ -2,7 +2,7 @@ "id": "CVE-2013-1674", "sourceIdentifier": "security@mozilla.org", "published": "2013-05-16T11:45:30.857", - "lastModified": "2017-09-19T01:36:09.827", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -99,33 +99,33 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0:*:*:*:*:*:*:*", - "matchCriteriaId": "D9BBC7F8-D102-403F-8A88-AF279536E2F0" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0:*:*:*:*:*:*:*", + "matchCriteriaId": "3283FBAC-B77A-4C62-9D51-70BB35FA3D13" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "DFDAC701-5E69-4633-8CE4-04B8AFCC10C2" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "886D8A1F-ECDD-4FE9-A4E5-2322EEC0B880" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "83D5CFC4-C5DD-4747-985A-BC7A8E7C6EF7" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "E10B8803-C319-4AAA-81CF-FA206A33BA55" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.3:*:*:*:*:*:*:*", - "matchCriteriaId": "D5AFA78C-71F3-4E64-8A8F-5BA028F04037" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.3:*:*:*:*:*:*:*", + "matchCriteriaId": "E2B5567C-8969-456D-B6DF-3562B99C41FE" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.4:*:*:*:*:*:*:*", - "matchCriteriaId": "F99963C6-175B-4099-86F4-BADCA43DB41F" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.4:*:*:*:*:*:*:*", + "matchCriteriaId": "5657779C-19F9-42B8-BBBD-292B898E8FD2" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.5:*:*:*:*:*:*:*", - "matchCriteriaId": "96530DB0-8A9E-48FD-A5C5-28FD467568B2" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.5:*:*:*:*:*:*:*", + "matchCriteriaId": "EEA3B9F4-BD8E-488B-A362-0B86BC6DA275" } ] } diff --git a/CVE-2013/CVE-2013-16xx/CVE-2013-1675.json b/CVE-2013/CVE-2013-16xx/CVE-2013-1675.json index 60080e622c2..1dd08e3a59b 100644 --- a/CVE-2013/CVE-2013-16xx/CVE-2013-1675.json +++ b/CVE-2013/CVE-2013-16xx/CVE-2013-1675.json @@ -2,7 +2,7 @@ "id": "CVE-2013-1675", "sourceIdentifier": "security@mozilla.org", "published": "2013-05-16T11:45:30.877", - "lastModified": "2024-07-16T17:35:45.563", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Analyzed", "cveTags": [], "cisaExploitAdd": "2022-03-03", @@ -95,10 +95,10 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "versionStartIncluding": "17.0", "versionEndExcluding": "17.0.6", - "matchCriteriaId": "5D7030AD-F587-413F-9A4C-2E01ED98555F" + "matchCriteriaId": "00DB2973-F49D-4FB9-9692-9C8ED7E5A4A9" }, { "vulnerable": true, diff --git a/CVE-2013/CVE-2013-16xx/CVE-2013-1676.json b/CVE-2013/CVE-2013-16xx/CVE-2013-1676.json index b12108c7d17..cd219e1fb19 100644 --- a/CVE-2013/CVE-2013-16xx/CVE-2013-1676.json +++ b/CVE-2013/CVE-2013-16xx/CVE-2013-1676.json @@ -2,7 +2,7 @@ "id": "CVE-2013-1676", "sourceIdentifier": "security@mozilla.org", "published": "2013-05-16T11:45:30.900", - "lastModified": "2017-09-19T01:36:09.983", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -99,33 +99,33 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0:*:*:*:*:*:*:*", - "matchCriteriaId": "D9BBC7F8-D102-403F-8A88-AF279536E2F0" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0:*:*:*:*:*:*:*", + "matchCriteriaId": "3283FBAC-B77A-4C62-9D51-70BB35FA3D13" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "DFDAC701-5E69-4633-8CE4-04B8AFCC10C2" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "886D8A1F-ECDD-4FE9-A4E5-2322EEC0B880" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "83D5CFC4-C5DD-4747-985A-BC7A8E7C6EF7" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "E10B8803-C319-4AAA-81CF-FA206A33BA55" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.3:*:*:*:*:*:*:*", - "matchCriteriaId": "D5AFA78C-71F3-4E64-8A8F-5BA028F04037" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.3:*:*:*:*:*:*:*", + "matchCriteriaId": "E2B5567C-8969-456D-B6DF-3562B99C41FE" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.4:*:*:*:*:*:*:*", - "matchCriteriaId": "F99963C6-175B-4099-86F4-BADCA43DB41F" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.4:*:*:*:*:*:*:*", + "matchCriteriaId": "5657779C-19F9-42B8-BBBD-292B898E8FD2" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.5:*:*:*:*:*:*:*", - "matchCriteriaId": "96530DB0-8A9E-48FD-A5C5-28FD467568B2" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.5:*:*:*:*:*:*:*", + "matchCriteriaId": "EEA3B9F4-BD8E-488B-A362-0B86BC6DA275" } ] } diff --git a/CVE-2013/CVE-2013-16xx/CVE-2013-1677.json b/CVE-2013/CVE-2013-16xx/CVE-2013-1677.json index dc2ac0f64ed..fe1cd7032eb 100644 --- a/CVE-2013/CVE-2013-16xx/CVE-2013-1677.json +++ b/CVE-2013/CVE-2013-16xx/CVE-2013-1677.json @@ -2,7 +2,7 @@ "id": "CVE-2013-1677", "sourceIdentifier": "security@mozilla.org", "published": "2013-05-16T11:45:30.923", - "lastModified": "2017-09-19T01:36:10.060", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -99,33 +99,33 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0:*:*:*:*:*:*:*", - "matchCriteriaId": "D9BBC7F8-D102-403F-8A88-AF279536E2F0" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0:*:*:*:*:*:*:*", + "matchCriteriaId": "3283FBAC-B77A-4C62-9D51-70BB35FA3D13" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "DFDAC701-5E69-4633-8CE4-04B8AFCC10C2" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "886D8A1F-ECDD-4FE9-A4E5-2322EEC0B880" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "83D5CFC4-C5DD-4747-985A-BC7A8E7C6EF7" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "E10B8803-C319-4AAA-81CF-FA206A33BA55" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.3:*:*:*:*:*:*:*", - "matchCriteriaId": "D5AFA78C-71F3-4E64-8A8F-5BA028F04037" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.3:*:*:*:*:*:*:*", + "matchCriteriaId": "E2B5567C-8969-456D-B6DF-3562B99C41FE" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.4:*:*:*:*:*:*:*", - "matchCriteriaId": "F99963C6-175B-4099-86F4-BADCA43DB41F" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.4:*:*:*:*:*:*:*", + "matchCriteriaId": "5657779C-19F9-42B8-BBBD-292B898E8FD2" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.5:*:*:*:*:*:*:*", - "matchCriteriaId": "96530DB0-8A9E-48FD-A5C5-28FD467568B2" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.5:*:*:*:*:*:*:*", + "matchCriteriaId": "EEA3B9F4-BD8E-488B-A362-0B86BC6DA275" } ] } diff --git a/CVE-2013/CVE-2013-16xx/CVE-2013-1678.json b/CVE-2013/CVE-2013-16xx/CVE-2013-1678.json index 28ab91507f8..49946d82b07 100644 --- a/CVE-2013/CVE-2013-16xx/CVE-2013-1678.json +++ b/CVE-2013/CVE-2013-16xx/CVE-2013-1678.json @@ -2,7 +2,7 @@ "id": "CVE-2013-1678", "sourceIdentifier": "security@mozilla.org", "published": "2013-05-16T11:45:30.947", - "lastModified": "2017-09-19T01:36:10.137", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -99,33 +99,33 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0:*:*:*:*:*:*:*", - "matchCriteriaId": "D9BBC7F8-D102-403F-8A88-AF279536E2F0" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0:*:*:*:*:*:*:*", + "matchCriteriaId": "3283FBAC-B77A-4C62-9D51-70BB35FA3D13" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "DFDAC701-5E69-4633-8CE4-04B8AFCC10C2" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "886D8A1F-ECDD-4FE9-A4E5-2322EEC0B880" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "83D5CFC4-C5DD-4747-985A-BC7A8E7C6EF7" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "E10B8803-C319-4AAA-81CF-FA206A33BA55" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.3:*:*:*:*:*:*:*", - "matchCriteriaId": "D5AFA78C-71F3-4E64-8A8F-5BA028F04037" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.3:*:*:*:*:*:*:*", + "matchCriteriaId": "E2B5567C-8969-456D-B6DF-3562B99C41FE" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.4:*:*:*:*:*:*:*", - "matchCriteriaId": "F99963C6-175B-4099-86F4-BADCA43DB41F" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.4:*:*:*:*:*:*:*", + "matchCriteriaId": "5657779C-19F9-42B8-BBBD-292B898E8FD2" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.5:*:*:*:*:*:*:*", - "matchCriteriaId": "96530DB0-8A9E-48FD-A5C5-28FD467568B2" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.5:*:*:*:*:*:*:*", + "matchCriteriaId": "EEA3B9F4-BD8E-488B-A362-0B86BC6DA275" } ] } diff --git a/CVE-2013/CVE-2013-16xx/CVE-2013-1679.json b/CVE-2013/CVE-2013-16xx/CVE-2013-1679.json index 2d63ec0e741..64843100501 100644 --- a/CVE-2013/CVE-2013-16xx/CVE-2013-1679.json +++ b/CVE-2013/CVE-2013-16xx/CVE-2013-1679.json @@ -2,7 +2,7 @@ "id": "CVE-2013-1679", "sourceIdentifier": "security@mozilla.org", "published": "2013-05-16T11:45:30.970", - "lastModified": "2017-09-19T01:36:10.200", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -99,33 +99,33 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0:*:*:*:*:*:*:*", - "matchCriteriaId": "D9BBC7F8-D102-403F-8A88-AF279536E2F0" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0:*:*:*:*:*:*:*", + "matchCriteriaId": "3283FBAC-B77A-4C62-9D51-70BB35FA3D13" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "DFDAC701-5E69-4633-8CE4-04B8AFCC10C2" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "886D8A1F-ECDD-4FE9-A4E5-2322EEC0B880" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "83D5CFC4-C5DD-4747-985A-BC7A8E7C6EF7" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "E10B8803-C319-4AAA-81CF-FA206A33BA55" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.3:*:*:*:*:*:*:*", - "matchCriteriaId": "D5AFA78C-71F3-4E64-8A8F-5BA028F04037" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.3:*:*:*:*:*:*:*", + "matchCriteriaId": "E2B5567C-8969-456D-B6DF-3562B99C41FE" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.4:*:*:*:*:*:*:*", - "matchCriteriaId": "F99963C6-175B-4099-86F4-BADCA43DB41F" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.4:*:*:*:*:*:*:*", + "matchCriteriaId": "5657779C-19F9-42B8-BBBD-292B898E8FD2" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.5:*:*:*:*:*:*:*", - "matchCriteriaId": "96530DB0-8A9E-48FD-A5C5-28FD467568B2" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.5:*:*:*:*:*:*:*", + "matchCriteriaId": "EEA3B9F4-BD8E-488B-A362-0B86BC6DA275" } ] } diff --git a/CVE-2013/CVE-2013-16xx/CVE-2013-1680.json b/CVE-2013/CVE-2013-16xx/CVE-2013-1680.json index a3cc6a78485..6da6e6e1894 100644 --- a/CVE-2013/CVE-2013-16xx/CVE-2013-1680.json +++ b/CVE-2013/CVE-2013-16xx/CVE-2013-1680.json @@ -2,7 +2,7 @@ "id": "CVE-2013-1680", "sourceIdentifier": "security@mozilla.org", "published": "2013-05-16T11:45:30.990", - "lastModified": "2017-09-19T01:36:10.280", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -99,33 +99,33 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0:*:*:*:*:*:*:*", - "matchCriteriaId": "D9BBC7F8-D102-403F-8A88-AF279536E2F0" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0:*:*:*:*:*:*:*", + "matchCriteriaId": "3283FBAC-B77A-4C62-9D51-70BB35FA3D13" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "DFDAC701-5E69-4633-8CE4-04B8AFCC10C2" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "886D8A1F-ECDD-4FE9-A4E5-2322EEC0B880" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "83D5CFC4-C5DD-4747-985A-BC7A8E7C6EF7" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "E10B8803-C319-4AAA-81CF-FA206A33BA55" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.3:*:*:*:*:*:*:*", - "matchCriteriaId": "D5AFA78C-71F3-4E64-8A8F-5BA028F04037" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.3:*:*:*:*:*:*:*", + "matchCriteriaId": "E2B5567C-8969-456D-B6DF-3562B99C41FE" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.4:*:*:*:*:*:*:*", - "matchCriteriaId": "F99963C6-175B-4099-86F4-BADCA43DB41F" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.4:*:*:*:*:*:*:*", + "matchCriteriaId": "5657779C-19F9-42B8-BBBD-292B898E8FD2" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.5:*:*:*:*:*:*:*", - "matchCriteriaId": "96530DB0-8A9E-48FD-A5C5-28FD467568B2" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.5:*:*:*:*:*:*:*", + "matchCriteriaId": "EEA3B9F4-BD8E-488B-A362-0B86BC6DA275" } ] } diff --git a/CVE-2013/CVE-2013-16xx/CVE-2013-1681.json b/CVE-2013/CVE-2013-16xx/CVE-2013-1681.json index 3f04ddbe1dc..aabea99277c 100644 --- a/CVE-2013/CVE-2013-16xx/CVE-2013-1681.json +++ b/CVE-2013/CVE-2013-16xx/CVE-2013-1681.json @@ -2,7 +2,7 @@ "id": "CVE-2013-1681", "sourceIdentifier": "security@mozilla.org", "published": "2013-05-16T11:45:31.017", - "lastModified": "2017-09-19T01:36:10.373", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -99,33 +99,33 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0:*:*:*:*:*:*:*", - "matchCriteriaId": "D9BBC7F8-D102-403F-8A88-AF279536E2F0" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0:*:*:*:*:*:*:*", + "matchCriteriaId": "3283FBAC-B77A-4C62-9D51-70BB35FA3D13" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "DFDAC701-5E69-4633-8CE4-04B8AFCC10C2" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "886D8A1F-ECDD-4FE9-A4E5-2322EEC0B880" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "83D5CFC4-C5DD-4747-985A-BC7A8E7C6EF7" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "E10B8803-C319-4AAA-81CF-FA206A33BA55" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.3:*:*:*:*:*:*:*", - "matchCriteriaId": "D5AFA78C-71F3-4E64-8A8F-5BA028F04037" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.3:*:*:*:*:*:*:*", + "matchCriteriaId": "E2B5567C-8969-456D-B6DF-3562B99C41FE" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.4:*:*:*:*:*:*:*", - "matchCriteriaId": "F99963C6-175B-4099-86F4-BADCA43DB41F" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.4:*:*:*:*:*:*:*", + "matchCriteriaId": "5657779C-19F9-42B8-BBBD-292B898E8FD2" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.5:*:*:*:*:*:*:*", - "matchCriteriaId": "96530DB0-8A9E-48FD-A5C5-28FD467568B2" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.5:*:*:*:*:*:*:*", + "matchCriteriaId": "EEA3B9F4-BD8E-488B-A362-0B86BC6DA275" } ] } diff --git a/CVE-2013/CVE-2013-16xx/CVE-2013-1682.json b/CVE-2013/CVE-2013-16xx/CVE-2013-1682.json index c790e011bf4..c5d7439e225 100644 --- a/CVE-2013/CVE-2013-16xx/CVE-2013-1682.json +++ b/CVE-2013/CVE-2013-16xx/CVE-2013-1682.json @@ -2,7 +2,7 @@ "id": "CVE-2013-1682", "sourceIdentifier": "security@mozilla.org", "published": "2013-06-26T03:19:10.653", - "lastModified": "2017-09-19T01:36:10.450", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -104,38 +104,38 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0:*:*:*:*:*:*:*", - "matchCriteriaId": "D9BBC7F8-D102-403F-8A88-AF279536E2F0" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0:*:*:*:*:*:*:*", + "matchCriteriaId": "3283FBAC-B77A-4C62-9D51-70BB35FA3D13" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "DFDAC701-5E69-4633-8CE4-04B8AFCC10C2" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "886D8A1F-ECDD-4FE9-A4E5-2322EEC0B880" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "83D5CFC4-C5DD-4747-985A-BC7A8E7C6EF7" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "E10B8803-C319-4AAA-81CF-FA206A33BA55" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.3:*:*:*:*:*:*:*", - "matchCriteriaId": "D5AFA78C-71F3-4E64-8A8F-5BA028F04037" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.3:*:*:*:*:*:*:*", + "matchCriteriaId": "E2B5567C-8969-456D-B6DF-3562B99C41FE" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.4:*:*:*:*:*:*:*", - "matchCriteriaId": "F99963C6-175B-4099-86F4-BADCA43DB41F" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.4:*:*:*:*:*:*:*", + "matchCriteriaId": "5657779C-19F9-42B8-BBBD-292B898E8FD2" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.5:*:*:*:*:*:*:*", - "matchCriteriaId": "96530DB0-8A9E-48FD-A5C5-28FD467568B2" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.5:*:*:*:*:*:*:*", + "matchCriteriaId": "EEA3B9F4-BD8E-488B-A362-0B86BC6DA275" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.6:*:*:*:*:*:*:*", - "matchCriteriaId": "9B0AC5E6-F4E3-41A9-A611-A0FAF11ABF68" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.6:*:*:*:*:*:*:*", + "matchCriteriaId": "6A91BD4A-76BD-40B9-9E12-22CACAAE42BF" } ] } diff --git a/CVE-2013/CVE-2013-16xx/CVE-2013-1684.json b/CVE-2013/CVE-2013-16xx/CVE-2013-1684.json index 979d54ddd43..f389b5d2e02 100644 --- a/CVE-2013/CVE-2013-16xx/CVE-2013-1684.json +++ b/CVE-2013/CVE-2013-16xx/CVE-2013-1684.json @@ -2,7 +2,7 @@ "id": "CVE-2013-1684", "sourceIdentifier": "security@mozilla.org", "published": "2013-06-26T03:19:10.707", - "lastModified": "2017-09-19T01:36:10.590", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -104,38 +104,38 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0:*:*:*:*:*:*:*", - "matchCriteriaId": "D9BBC7F8-D102-403F-8A88-AF279536E2F0" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0:*:*:*:*:*:*:*", + "matchCriteriaId": "3283FBAC-B77A-4C62-9D51-70BB35FA3D13" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "DFDAC701-5E69-4633-8CE4-04B8AFCC10C2" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "886D8A1F-ECDD-4FE9-A4E5-2322EEC0B880" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "83D5CFC4-C5DD-4747-985A-BC7A8E7C6EF7" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "E10B8803-C319-4AAA-81CF-FA206A33BA55" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.3:*:*:*:*:*:*:*", - "matchCriteriaId": "D5AFA78C-71F3-4E64-8A8F-5BA028F04037" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.3:*:*:*:*:*:*:*", + "matchCriteriaId": "E2B5567C-8969-456D-B6DF-3562B99C41FE" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.4:*:*:*:*:*:*:*", - "matchCriteriaId": "F99963C6-175B-4099-86F4-BADCA43DB41F" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.4:*:*:*:*:*:*:*", + "matchCriteriaId": "5657779C-19F9-42B8-BBBD-292B898E8FD2" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.5:*:*:*:*:*:*:*", - "matchCriteriaId": "96530DB0-8A9E-48FD-A5C5-28FD467568B2" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.5:*:*:*:*:*:*:*", + "matchCriteriaId": "EEA3B9F4-BD8E-488B-A362-0B86BC6DA275" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.6:*:*:*:*:*:*:*", - "matchCriteriaId": "9B0AC5E6-F4E3-41A9-A611-A0FAF11ABF68" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.6:*:*:*:*:*:*:*", + "matchCriteriaId": "6A91BD4A-76BD-40B9-9E12-22CACAAE42BF" } ] } diff --git a/CVE-2013/CVE-2013-16xx/CVE-2013-1685.json b/CVE-2013/CVE-2013-16xx/CVE-2013-1685.json index 0007a204f1c..d6bc2805e3f 100644 --- a/CVE-2013/CVE-2013-16xx/CVE-2013-1685.json +++ b/CVE-2013/CVE-2013-16xx/CVE-2013-1685.json @@ -2,7 +2,7 @@ "id": "CVE-2013-1685", "sourceIdentifier": "security@mozilla.org", "published": "2013-06-26T03:19:10.720", - "lastModified": "2017-09-19T01:36:10.670", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -104,38 +104,38 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0:*:*:*:*:*:*:*", - "matchCriteriaId": "D9BBC7F8-D102-403F-8A88-AF279536E2F0" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0:*:*:*:*:*:*:*", + "matchCriteriaId": "3283FBAC-B77A-4C62-9D51-70BB35FA3D13" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "DFDAC701-5E69-4633-8CE4-04B8AFCC10C2" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "886D8A1F-ECDD-4FE9-A4E5-2322EEC0B880" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "83D5CFC4-C5DD-4747-985A-BC7A8E7C6EF7" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "E10B8803-C319-4AAA-81CF-FA206A33BA55" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.3:*:*:*:*:*:*:*", - "matchCriteriaId": "D5AFA78C-71F3-4E64-8A8F-5BA028F04037" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.3:*:*:*:*:*:*:*", + "matchCriteriaId": "E2B5567C-8969-456D-B6DF-3562B99C41FE" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.4:*:*:*:*:*:*:*", - "matchCriteriaId": "F99963C6-175B-4099-86F4-BADCA43DB41F" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.4:*:*:*:*:*:*:*", + "matchCriteriaId": "5657779C-19F9-42B8-BBBD-292B898E8FD2" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.5:*:*:*:*:*:*:*", - "matchCriteriaId": "96530DB0-8A9E-48FD-A5C5-28FD467568B2" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.5:*:*:*:*:*:*:*", + "matchCriteriaId": "EEA3B9F4-BD8E-488B-A362-0B86BC6DA275" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.6:*:*:*:*:*:*:*", - "matchCriteriaId": "9B0AC5E6-F4E3-41A9-A611-A0FAF11ABF68" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.6:*:*:*:*:*:*:*", + "matchCriteriaId": "6A91BD4A-76BD-40B9-9E12-22CACAAE42BF" } ] } diff --git a/CVE-2013/CVE-2013-16xx/CVE-2013-1686.json b/CVE-2013/CVE-2013-16xx/CVE-2013-1686.json index 449b023356c..cf37d9761ec 100644 --- a/CVE-2013/CVE-2013-16xx/CVE-2013-1686.json +++ b/CVE-2013/CVE-2013-16xx/CVE-2013-1686.json @@ -2,7 +2,7 @@ "id": "CVE-2013-1686", "sourceIdentifier": "security@mozilla.org", "published": "2013-06-26T03:19:10.740", - "lastModified": "2017-09-19T01:36:10.733", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -104,38 +104,38 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0:*:*:*:*:*:*:*", - "matchCriteriaId": "D9BBC7F8-D102-403F-8A88-AF279536E2F0" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0:*:*:*:*:*:*:*", + "matchCriteriaId": "3283FBAC-B77A-4C62-9D51-70BB35FA3D13" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "DFDAC701-5E69-4633-8CE4-04B8AFCC10C2" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "886D8A1F-ECDD-4FE9-A4E5-2322EEC0B880" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "83D5CFC4-C5DD-4747-985A-BC7A8E7C6EF7" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "E10B8803-C319-4AAA-81CF-FA206A33BA55" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.3:*:*:*:*:*:*:*", - "matchCriteriaId": "D5AFA78C-71F3-4E64-8A8F-5BA028F04037" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.3:*:*:*:*:*:*:*", + "matchCriteriaId": "E2B5567C-8969-456D-B6DF-3562B99C41FE" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.4:*:*:*:*:*:*:*", - "matchCriteriaId": "F99963C6-175B-4099-86F4-BADCA43DB41F" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.4:*:*:*:*:*:*:*", + "matchCriteriaId": "5657779C-19F9-42B8-BBBD-292B898E8FD2" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.5:*:*:*:*:*:*:*", - "matchCriteriaId": "96530DB0-8A9E-48FD-A5C5-28FD467568B2" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.5:*:*:*:*:*:*:*", + "matchCriteriaId": "EEA3B9F4-BD8E-488B-A362-0B86BC6DA275" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.6:*:*:*:*:*:*:*", - "matchCriteriaId": "9B0AC5E6-F4E3-41A9-A611-A0FAF11ABF68" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.6:*:*:*:*:*:*:*", + "matchCriteriaId": "6A91BD4A-76BD-40B9-9E12-22CACAAE42BF" } ] } diff --git a/CVE-2013/CVE-2013-16xx/CVE-2013-1687.json b/CVE-2013/CVE-2013-16xx/CVE-2013-1687.json index 8a65cc9aada..62f46441d75 100644 --- a/CVE-2013/CVE-2013-16xx/CVE-2013-1687.json +++ b/CVE-2013/CVE-2013-16xx/CVE-2013-1687.json @@ -2,7 +2,7 @@ "id": "CVE-2013-1687", "sourceIdentifier": "security@mozilla.org", "published": "2013-06-26T03:19:10.757", - "lastModified": "2017-09-19T01:36:10.810", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -104,38 +104,38 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0:*:*:*:*:*:*:*", - "matchCriteriaId": "D9BBC7F8-D102-403F-8A88-AF279536E2F0" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0:*:*:*:*:*:*:*", + "matchCriteriaId": "3283FBAC-B77A-4C62-9D51-70BB35FA3D13" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "DFDAC701-5E69-4633-8CE4-04B8AFCC10C2" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "886D8A1F-ECDD-4FE9-A4E5-2322EEC0B880" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "83D5CFC4-C5DD-4747-985A-BC7A8E7C6EF7" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "E10B8803-C319-4AAA-81CF-FA206A33BA55" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.3:*:*:*:*:*:*:*", - "matchCriteriaId": "D5AFA78C-71F3-4E64-8A8F-5BA028F04037" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.3:*:*:*:*:*:*:*", + "matchCriteriaId": "E2B5567C-8969-456D-B6DF-3562B99C41FE" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.4:*:*:*:*:*:*:*", - "matchCriteriaId": "F99963C6-175B-4099-86F4-BADCA43DB41F" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.4:*:*:*:*:*:*:*", + "matchCriteriaId": "5657779C-19F9-42B8-BBBD-292B898E8FD2" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.5:*:*:*:*:*:*:*", - "matchCriteriaId": "96530DB0-8A9E-48FD-A5C5-28FD467568B2" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.5:*:*:*:*:*:*:*", + "matchCriteriaId": "EEA3B9F4-BD8E-488B-A362-0B86BC6DA275" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.6:*:*:*:*:*:*:*", - "matchCriteriaId": "9B0AC5E6-F4E3-41A9-A611-A0FAF11ABF68" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.6:*:*:*:*:*:*:*", + "matchCriteriaId": "6A91BD4A-76BD-40B9-9E12-22CACAAE42BF" } ] } diff --git a/CVE-2013/CVE-2013-16xx/CVE-2013-1690.json b/CVE-2013/CVE-2013-16xx/CVE-2013-1690.json index f64fef0e352..89a917c73a3 100644 --- a/CVE-2013/CVE-2013-16xx/CVE-2013-1690.json +++ b/CVE-2013/CVE-2013-16xx/CVE-2013-1690.json @@ -2,7 +2,7 @@ "id": "CVE-2013-1690", "sourceIdentifier": "security@mozilla.org", "published": "2013-06-26T03:19:10.793", - "lastModified": "2024-07-09T18:25:57.940", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Analyzed", "cveTags": [], "cisaExploitAdd": "2022-03-28", @@ -95,10 +95,10 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "versionStartIncluding": "17.0", "versionEndExcluding": "17.0.7", - "matchCriteriaId": "C598E3DF-1B51-4FFC-8B05-D9BEF244AACA" + "matchCriteriaId": "56FCDE03-FF73-45AE-8100-44BD50C4BD27" }, { "vulnerable": true, diff --git a/CVE-2013/CVE-2013-16xx/CVE-2013-1692.json b/CVE-2013/CVE-2013-16xx/CVE-2013-1692.json index ee3dca86798..df1327988b9 100644 --- a/CVE-2013/CVE-2013-16xx/CVE-2013-1692.json +++ b/CVE-2013/CVE-2013-16xx/CVE-2013-1692.json @@ -2,7 +2,7 @@ "id": "CVE-2013-1692", "sourceIdentifier": "security@mozilla.org", "published": "2013-06-26T03:19:10.810", - "lastModified": "2017-09-19T01:36:11.030", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -104,38 +104,38 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0:*:*:*:*:*:*:*", - "matchCriteriaId": "D9BBC7F8-D102-403F-8A88-AF279536E2F0" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0:*:*:*:*:*:*:*", + "matchCriteriaId": "3283FBAC-B77A-4C62-9D51-70BB35FA3D13" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "DFDAC701-5E69-4633-8CE4-04B8AFCC10C2" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "886D8A1F-ECDD-4FE9-A4E5-2322EEC0B880" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "83D5CFC4-C5DD-4747-985A-BC7A8E7C6EF7" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "E10B8803-C319-4AAA-81CF-FA206A33BA55" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.3:*:*:*:*:*:*:*", - "matchCriteriaId": "D5AFA78C-71F3-4E64-8A8F-5BA028F04037" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.3:*:*:*:*:*:*:*", + "matchCriteriaId": "E2B5567C-8969-456D-B6DF-3562B99C41FE" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.4:*:*:*:*:*:*:*", - "matchCriteriaId": "F99963C6-175B-4099-86F4-BADCA43DB41F" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.4:*:*:*:*:*:*:*", + "matchCriteriaId": "5657779C-19F9-42B8-BBBD-292B898E8FD2" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.5:*:*:*:*:*:*:*", - "matchCriteriaId": "96530DB0-8A9E-48FD-A5C5-28FD467568B2" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.5:*:*:*:*:*:*:*", + "matchCriteriaId": "EEA3B9F4-BD8E-488B-A362-0B86BC6DA275" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.6:*:*:*:*:*:*:*", - "matchCriteriaId": "9B0AC5E6-F4E3-41A9-A611-A0FAF11ABF68" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.6:*:*:*:*:*:*:*", + "matchCriteriaId": "6A91BD4A-76BD-40B9-9E12-22CACAAE42BF" } ] } diff --git a/CVE-2013/CVE-2013-16xx/CVE-2013-1693.json b/CVE-2013/CVE-2013-16xx/CVE-2013-1693.json index 8f3f3f89df3..c074e30e9e5 100644 --- a/CVE-2013/CVE-2013-16xx/CVE-2013-1693.json +++ b/CVE-2013/CVE-2013-16xx/CVE-2013-1693.json @@ -2,7 +2,7 @@ "id": "CVE-2013-1693", "sourceIdentifier": "security@mozilla.org", "published": "2013-06-26T03:19:10.830", - "lastModified": "2017-09-19T01:36:11.123", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -104,38 +104,38 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0:*:*:*:*:*:*:*", - "matchCriteriaId": "D9BBC7F8-D102-403F-8A88-AF279536E2F0" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0:*:*:*:*:*:*:*", + "matchCriteriaId": "3283FBAC-B77A-4C62-9D51-70BB35FA3D13" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "DFDAC701-5E69-4633-8CE4-04B8AFCC10C2" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "886D8A1F-ECDD-4FE9-A4E5-2322EEC0B880" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "83D5CFC4-C5DD-4747-985A-BC7A8E7C6EF7" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "E10B8803-C319-4AAA-81CF-FA206A33BA55" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.3:*:*:*:*:*:*:*", - "matchCriteriaId": "D5AFA78C-71F3-4E64-8A8F-5BA028F04037" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.3:*:*:*:*:*:*:*", + "matchCriteriaId": "E2B5567C-8969-456D-B6DF-3562B99C41FE" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.4:*:*:*:*:*:*:*", - "matchCriteriaId": "F99963C6-175B-4099-86F4-BADCA43DB41F" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.4:*:*:*:*:*:*:*", + "matchCriteriaId": "5657779C-19F9-42B8-BBBD-292B898E8FD2" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.5:*:*:*:*:*:*:*", - "matchCriteriaId": "96530DB0-8A9E-48FD-A5C5-28FD467568B2" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.5:*:*:*:*:*:*:*", + "matchCriteriaId": "EEA3B9F4-BD8E-488B-A362-0B86BC6DA275" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.6:*:*:*:*:*:*:*", - "matchCriteriaId": "9B0AC5E6-F4E3-41A9-A611-A0FAF11ABF68" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.6:*:*:*:*:*:*:*", + "matchCriteriaId": "6A91BD4A-76BD-40B9-9E12-22CACAAE42BF" } ] } diff --git a/CVE-2013/CVE-2013-16xx/CVE-2013-1694.json b/CVE-2013/CVE-2013-16xx/CVE-2013-1694.json index e796c15ce85..da5a60e95e9 100644 --- a/CVE-2013/CVE-2013-16xx/CVE-2013-1694.json +++ b/CVE-2013/CVE-2013-16xx/CVE-2013-1694.json @@ -2,7 +2,7 @@ "id": "CVE-2013-1694", "sourceIdentifier": "security@mozilla.org", "published": "2013-06-26T03:19:10.847", - "lastModified": "2017-09-19T01:36:11.200", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -104,38 +104,38 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0:*:*:*:*:*:*:*", - "matchCriteriaId": "D9BBC7F8-D102-403F-8A88-AF279536E2F0" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0:*:*:*:*:*:*:*", + "matchCriteriaId": "3283FBAC-B77A-4C62-9D51-70BB35FA3D13" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "DFDAC701-5E69-4633-8CE4-04B8AFCC10C2" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "886D8A1F-ECDD-4FE9-A4E5-2322EEC0B880" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "83D5CFC4-C5DD-4747-985A-BC7A8E7C6EF7" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "E10B8803-C319-4AAA-81CF-FA206A33BA55" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.3:*:*:*:*:*:*:*", - "matchCriteriaId": "D5AFA78C-71F3-4E64-8A8F-5BA028F04037" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.3:*:*:*:*:*:*:*", + "matchCriteriaId": "E2B5567C-8969-456D-B6DF-3562B99C41FE" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.4:*:*:*:*:*:*:*", - "matchCriteriaId": "F99963C6-175B-4099-86F4-BADCA43DB41F" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.4:*:*:*:*:*:*:*", + "matchCriteriaId": "5657779C-19F9-42B8-BBBD-292B898E8FD2" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.5:*:*:*:*:*:*:*", - "matchCriteriaId": "96530DB0-8A9E-48FD-A5C5-28FD467568B2" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.5:*:*:*:*:*:*:*", + "matchCriteriaId": "EEA3B9F4-BD8E-488B-A362-0B86BC6DA275" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.6:*:*:*:*:*:*:*", - "matchCriteriaId": "9B0AC5E6-F4E3-41A9-A611-A0FAF11ABF68" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.6:*:*:*:*:*:*:*", + "matchCriteriaId": "6A91BD4A-76BD-40B9-9E12-22CACAAE42BF" } ] } diff --git a/CVE-2013/CVE-2013-16xx/CVE-2013-1697.json b/CVE-2013/CVE-2013-16xx/CVE-2013-1697.json index 8df45785e5f..a455242d312 100644 --- a/CVE-2013/CVE-2013-16xx/CVE-2013-1697.json +++ b/CVE-2013/CVE-2013-16xx/CVE-2013-1697.json @@ -2,7 +2,7 @@ "id": "CVE-2013-1697", "sourceIdentifier": "security@mozilla.org", "published": "2013-06-26T03:19:10.903", - "lastModified": "2017-09-19T01:36:11.403", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -104,38 +104,38 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0:*:*:*:*:*:*:*", - "matchCriteriaId": "D9BBC7F8-D102-403F-8A88-AF279536E2F0" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0:*:*:*:*:*:*:*", + "matchCriteriaId": "3283FBAC-B77A-4C62-9D51-70BB35FA3D13" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "DFDAC701-5E69-4633-8CE4-04B8AFCC10C2" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "886D8A1F-ECDD-4FE9-A4E5-2322EEC0B880" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "83D5CFC4-C5DD-4747-985A-BC7A8E7C6EF7" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "E10B8803-C319-4AAA-81CF-FA206A33BA55" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.3:*:*:*:*:*:*:*", - "matchCriteriaId": "D5AFA78C-71F3-4E64-8A8F-5BA028F04037" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.3:*:*:*:*:*:*:*", + "matchCriteriaId": "E2B5567C-8969-456D-B6DF-3562B99C41FE" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.4:*:*:*:*:*:*:*", - "matchCriteriaId": "F99963C6-175B-4099-86F4-BADCA43DB41F" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.4:*:*:*:*:*:*:*", + "matchCriteriaId": "5657779C-19F9-42B8-BBBD-292B898E8FD2" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.5:*:*:*:*:*:*:*", - "matchCriteriaId": "96530DB0-8A9E-48FD-A5C5-28FD467568B2" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.5:*:*:*:*:*:*:*", + "matchCriteriaId": "EEA3B9F4-BD8E-488B-A362-0B86BC6DA275" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.6:*:*:*:*:*:*:*", - "matchCriteriaId": "9B0AC5E6-F4E3-41A9-A611-A0FAF11ABF68" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.6:*:*:*:*:*:*:*", + "matchCriteriaId": "6A91BD4A-76BD-40B9-9E12-22CACAAE42BF" } ] } diff --git a/CVE-2013/CVE-2013-17xx/CVE-2013-1701.json b/CVE-2013/CVE-2013-17xx/CVE-2013-1701.json index ba4305470ac..77ecce2eae6 100644 --- a/CVE-2013/CVE-2013-17xx/CVE-2013-1701.json +++ b/CVE-2013/CVE-2013-17xx/CVE-2013-1701.json @@ -2,7 +2,7 @@ "id": "CVE-2013-1701", "sourceIdentifier": "security@mozilla.org", "published": "2013-08-07T01:55:04.677", - "lastModified": "2017-09-19T01:36:11.653", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -860,43 +860,43 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0:*:*:*:*:*:*:*", - "matchCriteriaId": "D9BBC7F8-D102-403F-8A88-AF279536E2F0" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0:*:*:*:*:*:*:*", + "matchCriteriaId": "3283FBAC-B77A-4C62-9D51-70BB35FA3D13" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "DFDAC701-5E69-4633-8CE4-04B8AFCC10C2" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "886D8A1F-ECDD-4FE9-A4E5-2322EEC0B880" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "83D5CFC4-C5DD-4747-985A-BC7A8E7C6EF7" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "E10B8803-C319-4AAA-81CF-FA206A33BA55" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.3:*:*:*:*:*:*:*", - "matchCriteriaId": "D5AFA78C-71F3-4E64-8A8F-5BA028F04037" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.3:*:*:*:*:*:*:*", + "matchCriteriaId": "E2B5567C-8969-456D-B6DF-3562B99C41FE" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.4:*:*:*:*:*:*:*", - "matchCriteriaId": "F99963C6-175B-4099-86F4-BADCA43DB41F" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.4:*:*:*:*:*:*:*", + "matchCriteriaId": "5657779C-19F9-42B8-BBBD-292B898E8FD2" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.5:*:*:*:*:*:*:*", - "matchCriteriaId": "96530DB0-8A9E-48FD-A5C5-28FD467568B2" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.5:*:*:*:*:*:*:*", + "matchCriteriaId": "EEA3B9F4-BD8E-488B-A362-0B86BC6DA275" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.6:*:*:*:*:*:*:*", - "matchCriteriaId": "9B0AC5E6-F4E3-41A9-A611-A0FAF11ABF68" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.6:*:*:*:*:*:*:*", + "matchCriteriaId": "6A91BD4A-76BD-40B9-9E12-22CACAAE42BF" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.7:*:*:*:*:*:*:*", - "matchCriteriaId": "832D5058-86F2-4FAA-A06D-AE1ED3A4C3B5" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.7:*:*:*:*:*:*:*", + "matchCriteriaId": "84CEB297-BEE9-4BBC-BA91-6AF14DCCA87C" } ] } diff --git a/CVE-2013/CVE-2013-17xx/CVE-2013-1706.json b/CVE-2013/CVE-2013-17xx/CVE-2013-1706.json index c882285041f..6198056d34e 100644 --- a/CVE-2013/CVE-2013-17xx/CVE-2013-1706.json +++ b/CVE-2013/CVE-2013-17xx/CVE-2013-1706.json @@ -2,7 +2,7 @@ "id": "CVE-2013-1706", "sourceIdentifier": "security@mozilla.org", "published": "2013-08-07T01:55:04.787", - "lastModified": "2017-09-19T01:36:11.967", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -63,43 +63,43 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0:*:*:*:*:*:*:*", - "matchCriteriaId": "D9BBC7F8-D102-403F-8A88-AF279536E2F0" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0:*:*:*:*:*:*:*", + "matchCriteriaId": "3283FBAC-B77A-4C62-9D51-70BB35FA3D13" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "DFDAC701-5E69-4633-8CE4-04B8AFCC10C2" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "886D8A1F-ECDD-4FE9-A4E5-2322EEC0B880" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "83D5CFC4-C5DD-4747-985A-BC7A8E7C6EF7" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "E10B8803-C319-4AAA-81CF-FA206A33BA55" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.3:*:*:*:*:*:*:*", - "matchCriteriaId": "D5AFA78C-71F3-4E64-8A8F-5BA028F04037" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.3:*:*:*:*:*:*:*", + "matchCriteriaId": "E2B5567C-8969-456D-B6DF-3562B99C41FE" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.4:*:*:*:*:*:*:*", - "matchCriteriaId": "F99963C6-175B-4099-86F4-BADCA43DB41F" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.4:*:*:*:*:*:*:*", + "matchCriteriaId": "5657779C-19F9-42B8-BBBD-292B898E8FD2" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.5:*:*:*:*:*:*:*", - "matchCriteriaId": "96530DB0-8A9E-48FD-A5C5-28FD467568B2" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.5:*:*:*:*:*:*:*", + "matchCriteriaId": "EEA3B9F4-BD8E-488B-A362-0B86BC6DA275" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.6:*:*:*:*:*:*:*", - "matchCriteriaId": "9B0AC5E6-F4E3-41A9-A611-A0FAF11ABF68" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.6:*:*:*:*:*:*:*", + "matchCriteriaId": "6A91BD4A-76BD-40B9-9E12-22CACAAE42BF" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.7:*:*:*:*:*:*:*", - "matchCriteriaId": "832D5058-86F2-4FAA-A06D-AE1ED3A4C3B5" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.7:*:*:*:*:*:*:*", + "matchCriteriaId": "84CEB297-BEE9-4BBC-BA91-6AF14DCCA87C" } ] } diff --git a/CVE-2013/CVE-2013-17xx/CVE-2013-1707.json b/CVE-2013/CVE-2013-17xx/CVE-2013-1707.json index 70eb5019389..30cbb1e8521 100644 --- a/CVE-2013/CVE-2013-17xx/CVE-2013-1707.json +++ b/CVE-2013/CVE-2013-17xx/CVE-2013-1707.json @@ -2,7 +2,7 @@ "id": "CVE-2013-1707", "sourceIdentifier": "security@mozilla.org", "published": "2013-08-07T01:55:04.810", - "lastModified": "2017-09-19T01:36:12.030", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -210,43 +210,43 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0:*:*:*:*:*:*:*", - "matchCriteriaId": "D9BBC7F8-D102-403F-8A88-AF279536E2F0" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0:*:*:*:*:*:*:*", + "matchCriteriaId": "3283FBAC-B77A-4C62-9D51-70BB35FA3D13" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "DFDAC701-5E69-4633-8CE4-04B8AFCC10C2" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "886D8A1F-ECDD-4FE9-A4E5-2322EEC0B880" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "83D5CFC4-C5DD-4747-985A-BC7A8E7C6EF7" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "E10B8803-C319-4AAA-81CF-FA206A33BA55" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.3:*:*:*:*:*:*:*", - "matchCriteriaId": "D5AFA78C-71F3-4E64-8A8F-5BA028F04037" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.3:*:*:*:*:*:*:*", + "matchCriteriaId": "E2B5567C-8969-456D-B6DF-3562B99C41FE" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.4:*:*:*:*:*:*:*", - "matchCriteriaId": "F99963C6-175B-4099-86F4-BADCA43DB41F" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.4:*:*:*:*:*:*:*", + "matchCriteriaId": "5657779C-19F9-42B8-BBBD-292B898E8FD2" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.5:*:*:*:*:*:*:*", - "matchCriteriaId": "96530DB0-8A9E-48FD-A5C5-28FD467568B2" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.5:*:*:*:*:*:*:*", + "matchCriteriaId": "EEA3B9F4-BD8E-488B-A362-0B86BC6DA275" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.6:*:*:*:*:*:*:*", - "matchCriteriaId": "9B0AC5E6-F4E3-41A9-A611-A0FAF11ABF68" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.6:*:*:*:*:*:*:*", + "matchCriteriaId": "6A91BD4A-76BD-40B9-9E12-22CACAAE42BF" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.7:*:*:*:*:*:*:*", - "matchCriteriaId": "832D5058-86F2-4FAA-A06D-AE1ED3A4C3B5" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.7:*:*:*:*:*:*:*", + "matchCriteriaId": "84CEB297-BEE9-4BBC-BA91-6AF14DCCA87C" } ] } diff --git a/CVE-2013/CVE-2013-17xx/CVE-2013-1709.json b/CVE-2013/CVE-2013-17xx/CVE-2013-1709.json index 55419192d70..ca100925c8e 100644 --- a/CVE-2013/CVE-2013-17xx/CVE-2013-1709.json +++ b/CVE-2013/CVE-2013-17xx/CVE-2013-1709.json @@ -2,7 +2,7 @@ "id": "CVE-2013-1709", "sourceIdentifier": "security@mozilla.org", "published": "2013-08-07T01:55:04.853", - "lastModified": "2017-09-19T01:36:12.187", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -63,43 +63,43 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0:*:*:*:*:*:*:*", - "matchCriteriaId": "D9BBC7F8-D102-403F-8A88-AF279536E2F0" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0:*:*:*:*:*:*:*", + "matchCriteriaId": "3283FBAC-B77A-4C62-9D51-70BB35FA3D13" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "DFDAC701-5E69-4633-8CE4-04B8AFCC10C2" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "886D8A1F-ECDD-4FE9-A4E5-2322EEC0B880" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "83D5CFC4-C5DD-4747-985A-BC7A8E7C6EF7" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "E10B8803-C319-4AAA-81CF-FA206A33BA55" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.3:*:*:*:*:*:*:*", - "matchCriteriaId": "D5AFA78C-71F3-4E64-8A8F-5BA028F04037" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.3:*:*:*:*:*:*:*", + "matchCriteriaId": "E2B5567C-8969-456D-B6DF-3562B99C41FE" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.4:*:*:*:*:*:*:*", - "matchCriteriaId": "F99963C6-175B-4099-86F4-BADCA43DB41F" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.4:*:*:*:*:*:*:*", + "matchCriteriaId": "5657779C-19F9-42B8-BBBD-292B898E8FD2" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.5:*:*:*:*:*:*:*", - "matchCriteriaId": "96530DB0-8A9E-48FD-A5C5-28FD467568B2" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.5:*:*:*:*:*:*:*", + "matchCriteriaId": "EEA3B9F4-BD8E-488B-A362-0B86BC6DA275" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.6:*:*:*:*:*:*:*", - "matchCriteriaId": "9B0AC5E6-F4E3-41A9-A611-A0FAF11ABF68" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.6:*:*:*:*:*:*:*", + "matchCriteriaId": "6A91BD4A-76BD-40B9-9E12-22CACAAE42BF" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.7:*:*:*:*:*:*:*", - "matchCriteriaId": "832D5058-86F2-4FAA-A06D-AE1ED3A4C3B5" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.7:*:*:*:*:*:*:*", + "matchCriteriaId": "84CEB297-BEE9-4BBC-BA91-6AF14DCCA87C" } ] } diff --git a/CVE-2013/CVE-2013-17xx/CVE-2013-1710.json b/CVE-2013/CVE-2013-17xx/CVE-2013-1710.json index 98144131274..ad5eb8070b3 100644 --- a/CVE-2013/CVE-2013-17xx/CVE-2013-1710.json +++ b/CVE-2013/CVE-2013-17xx/CVE-2013-1710.json @@ -2,7 +2,7 @@ "id": "CVE-2013-1710", "sourceIdentifier": "security@mozilla.org", "published": "2013-08-07T01:55:04.877", - "lastModified": "2017-09-19T01:36:12.280", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -956,43 +956,43 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0:*:*:*:*:*:*:*", - "matchCriteriaId": "D9BBC7F8-D102-403F-8A88-AF279536E2F0" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0:*:*:*:*:*:*:*", + "matchCriteriaId": "3283FBAC-B77A-4C62-9D51-70BB35FA3D13" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "DFDAC701-5E69-4633-8CE4-04B8AFCC10C2" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "886D8A1F-ECDD-4FE9-A4E5-2322EEC0B880" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "83D5CFC4-C5DD-4747-985A-BC7A8E7C6EF7" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "E10B8803-C319-4AAA-81CF-FA206A33BA55" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.3:*:*:*:*:*:*:*", - "matchCriteriaId": "D5AFA78C-71F3-4E64-8A8F-5BA028F04037" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.3:*:*:*:*:*:*:*", + "matchCriteriaId": "E2B5567C-8969-456D-B6DF-3562B99C41FE" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.4:*:*:*:*:*:*:*", - "matchCriteriaId": "F99963C6-175B-4099-86F4-BADCA43DB41F" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.4:*:*:*:*:*:*:*", + "matchCriteriaId": "5657779C-19F9-42B8-BBBD-292B898E8FD2" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.5:*:*:*:*:*:*:*", - "matchCriteriaId": "96530DB0-8A9E-48FD-A5C5-28FD467568B2" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.5:*:*:*:*:*:*:*", + "matchCriteriaId": "EEA3B9F4-BD8E-488B-A362-0B86BC6DA275" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.6:*:*:*:*:*:*:*", - "matchCriteriaId": "9B0AC5E6-F4E3-41A9-A611-A0FAF11ABF68" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.6:*:*:*:*:*:*:*", + "matchCriteriaId": "6A91BD4A-76BD-40B9-9E12-22CACAAE42BF" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.7:*:*:*:*:*:*:*", - "matchCriteriaId": "832D5058-86F2-4FAA-A06D-AE1ED3A4C3B5" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.7:*:*:*:*:*:*:*", + "matchCriteriaId": "84CEB297-BEE9-4BBC-BA91-6AF14DCCA87C" } ] } diff --git a/CVE-2013/CVE-2013-17xx/CVE-2013-1712.json b/CVE-2013/CVE-2013-17xx/CVE-2013-1712.json index c6881cc20a0..3bde8b55ba8 100644 --- a/CVE-2013/CVE-2013-17xx/CVE-2013-1712.json +++ b/CVE-2013/CVE-2013-17xx/CVE-2013-1712.json @@ -2,7 +2,7 @@ "id": "CVE-2013-1712", "sourceIdentifier": "security@mozilla.org", "published": "2013-08-07T01:55:04.917", - "lastModified": "2017-09-19T01:36:12.420", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "evaluatorComment": "Per: http://cwe.mitre.org/data/definitions/426.html\n\nCWE-426: Untrusted Search Path", @@ -69,6 +69,46 @@ "versionEndIncluding": "22.0", "matchCriteriaId": "47AF449C-4766-4BBB-928A-F6437F083835" }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:17.0:*:*:*:*:*:*:*", + "matchCriteriaId": "3283FBAC-B77A-4C62-9D51-70BB35FA3D13" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "886D8A1F-ECDD-4FE9-A4E5-2322EEC0B880" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "E10B8803-C319-4AAA-81CF-FA206A33BA55" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.3:*:*:*:*:*:*:*", + "matchCriteriaId": "E2B5567C-8969-456D-B6DF-3562B99C41FE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.4:*:*:*:*:*:*:*", + "matchCriteriaId": "5657779C-19F9-42B8-BBBD-292B898E8FD2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.5:*:*:*:*:*:*:*", + "matchCriteriaId": "EEA3B9F4-BD8E-488B-A362-0B86BC6DA275" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.6:*:*:*:*:*:*:*", + "matchCriteriaId": "6A91BD4A-76BD-40B9-9E12-22CACAAE42BF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.7:*:*:*:*:*:*:*", + "matchCriteriaId": "84CEB297-BEE9-4BBC-BA91-6AF14DCCA87C" + }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox:19.0:*:*:*:*:*:*:*", @@ -99,46 +139,6 @@ "criteria": "cpe:2.3:a:mozilla:firefox:21.0:*:*:*:*:*:*:*", "matchCriteriaId": "7CC8D9A8-D4DB-4BC9-89CE-F3AF742C399F" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0:*:*:*:*:*:*:*", - "matchCriteriaId": "D9BBC7F8-D102-403F-8A88-AF279536E2F0" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "DFDAC701-5E69-4633-8CE4-04B8AFCC10C2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "83D5CFC4-C5DD-4747-985A-BC7A8E7C6EF7" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.3:*:*:*:*:*:*:*", - "matchCriteriaId": "D5AFA78C-71F3-4E64-8A8F-5BA028F04037" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.4:*:*:*:*:*:*:*", - "matchCriteriaId": "F99963C6-175B-4099-86F4-BADCA43DB41F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.5:*:*:*:*:*:*:*", - "matchCriteriaId": "96530DB0-8A9E-48FD-A5C5-28FD467568B2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.6:*:*:*:*:*:*:*", - "matchCriteriaId": "9B0AC5E6-F4E3-41A9-A611-A0FAF11ABF68" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.7:*:*:*:*:*:*:*", - "matchCriteriaId": "832D5058-86F2-4FAA-A06D-AE1ED3A4C3B5" - }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", diff --git a/CVE-2013/CVE-2013-17xx/CVE-2013-1713.json b/CVE-2013/CVE-2013-17xx/CVE-2013-1713.json index 39c800e0643..6a8a0d07e51 100644 --- a/CVE-2013/CVE-2013-17xx/CVE-2013-1713.json +++ b/CVE-2013/CVE-2013-17xx/CVE-2013-1713.json @@ -2,7 +2,7 @@ "id": "CVE-2013-1713", "sourceIdentifier": "security@mozilla.org", "published": "2013-08-07T01:55:04.940", - "lastModified": "2017-09-19T01:36:12.497", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -906,43 +906,43 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0:*:*:*:*:*:*:*", - "matchCriteriaId": "D9BBC7F8-D102-403F-8A88-AF279536E2F0" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0:*:*:*:*:*:*:*", + "matchCriteriaId": "3283FBAC-B77A-4C62-9D51-70BB35FA3D13" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "DFDAC701-5E69-4633-8CE4-04B8AFCC10C2" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "886D8A1F-ECDD-4FE9-A4E5-2322EEC0B880" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "83D5CFC4-C5DD-4747-985A-BC7A8E7C6EF7" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "E10B8803-C319-4AAA-81CF-FA206A33BA55" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.3:*:*:*:*:*:*:*", - "matchCriteriaId": "D5AFA78C-71F3-4E64-8A8F-5BA028F04037" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.3:*:*:*:*:*:*:*", + "matchCriteriaId": "E2B5567C-8969-456D-B6DF-3562B99C41FE" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.4:*:*:*:*:*:*:*", - "matchCriteriaId": "F99963C6-175B-4099-86F4-BADCA43DB41F" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.4:*:*:*:*:*:*:*", + "matchCriteriaId": "5657779C-19F9-42B8-BBBD-292B898E8FD2" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.5:*:*:*:*:*:*:*", - "matchCriteriaId": "96530DB0-8A9E-48FD-A5C5-28FD467568B2" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.5:*:*:*:*:*:*:*", + "matchCriteriaId": "EEA3B9F4-BD8E-488B-A362-0B86BC6DA275" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.6:*:*:*:*:*:*:*", - "matchCriteriaId": "9B0AC5E6-F4E3-41A9-A611-A0FAF11ABF68" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.6:*:*:*:*:*:*:*", + "matchCriteriaId": "6A91BD4A-76BD-40B9-9E12-22CACAAE42BF" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.7:*:*:*:*:*:*:*", - "matchCriteriaId": "832D5058-86F2-4FAA-A06D-AE1ED3A4C3B5" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.7:*:*:*:*:*:*:*", + "matchCriteriaId": "84CEB297-BEE9-4BBC-BA91-6AF14DCCA87C" } ] } diff --git a/CVE-2013/CVE-2013-17xx/CVE-2013-1714.json b/CVE-2013/CVE-2013-17xx/CVE-2013-1714.json index 0b802af87bd..d612d35c339 100644 --- a/CVE-2013/CVE-2013-17xx/CVE-2013-1714.json +++ b/CVE-2013/CVE-2013-17xx/CVE-2013-1714.json @@ -2,7 +2,7 @@ "id": "CVE-2013-1714", "sourceIdentifier": "security@mozilla.org", "published": "2013-08-07T01:55:04.963", - "lastModified": "2017-09-19T01:36:12.590", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -809,43 +809,43 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0:*:*:*:*:*:*:*", - "matchCriteriaId": "D9BBC7F8-D102-403F-8A88-AF279536E2F0" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0:*:*:*:*:*:*:*", + "matchCriteriaId": "3283FBAC-B77A-4C62-9D51-70BB35FA3D13" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "DFDAC701-5E69-4633-8CE4-04B8AFCC10C2" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "886D8A1F-ECDD-4FE9-A4E5-2322EEC0B880" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "83D5CFC4-C5DD-4747-985A-BC7A8E7C6EF7" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "E10B8803-C319-4AAA-81CF-FA206A33BA55" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.3:*:*:*:*:*:*:*", - "matchCriteriaId": "D5AFA78C-71F3-4E64-8A8F-5BA028F04037" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.3:*:*:*:*:*:*:*", + "matchCriteriaId": "E2B5567C-8969-456D-B6DF-3562B99C41FE" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.4:*:*:*:*:*:*:*", - "matchCriteriaId": "F99963C6-175B-4099-86F4-BADCA43DB41F" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.4:*:*:*:*:*:*:*", + "matchCriteriaId": "5657779C-19F9-42B8-BBBD-292B898E8FD2" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.5:*:*:*:*:*:*:*", - "matchCriteriaId": "96530DB0-8A9E-48FD-A5C5-28FD467568B2" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.5:*:*:*:*:*:*:*", + "matchCriteriaId": "EEA3B9F4-BD8E-488B-A362-0B86BC6DA275" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.6:*:*:*:*:*:*:*", - "matchCriteriaId": "9B0AC5E6-F4E3-41A9-A611-A0FAF11ABF68" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.6:*:*:*:*:*:*:*", + "matchCriteriaId": "6A91BD4A-76BD-40B9-9E12-22CACAAE42BF" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.7:*:*:*:*:*:*:*", - "matchCriteriaId": "832D5058-86F2-4FAA-A06D-AE1ED3A4C3B5" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.7:*:*:*:*:*:*:*", + "matchCriteriaId": "84CEB297-BEE9-4BBC-BA91-6AF14DCCA87C" } ] } diff --git a/CVE-2013/CVE-2013-17xx/CVE-2013-1717.json b/CVE-2013/CVE-2013-17xx/CVE-2013-1717.json index 6cc44c57187..cb0b58145e1 100644 --- a/CVE-2013/CVE-2013-17xx/CVE-2013-1717.json +++ b/CVE-2013/CVE-2013-17xx/CVE-2013-1717.json @@ -2,7 +2,7 @@ "id": "CVE-2013-1717", "sourceIdentifier": "security@mozilla.org", "published": "2013-08-07T01:55:05.020", - "lastModified": "2017-09-19T01:36:12.733", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -905,43 +905,43 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0:*:*:*:*:*:*:*", - "matchCriteriaId": "D9BBC7F8-D102-403F-8A88-AF279536E2F0" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0:*:*:*:*:*:*:*", + "matchCriteriaId": "3283FBAC-B77A-4C62-9D51-70BB35FA3D13" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "DFDAC701-5E69-4633-8CE4-04B8AFCC10C2" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "886D8A1F-ECDD-4FE9-A4E5-2322EEC0B880" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "83D5CFC4-C5DD-4747-985A-BC7A8E7C6EF7" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "E10B8803-C319-4AAA-81CF-FA206A33BA55" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.3:*:*:*:*:*:*:*", - "matchCriteriaId": "D5AFA78C-71F3-4E64-8A8F-5BA028F04037" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.3:*:*:*:*:*:*:*", + "matchCriteriaId": "E2B5567C-8969-456D-B6DF-3562B99C41FE" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.4:*:*:*:*:*:*:*", - "matchCriteriaId": "F99963C6-175B-4099-86F4-BADCA43DB41F" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.4:*:*:*:*:*:*:*", + "matchCriteriaId": "5657779C-19F9-42B8-BBBD-292B898E8FD2" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.5:*:*:*:*:*:*:*", - "matchCriteriaId": "96530DB0-8A9E-48FD-A5C5-28FD467568B2" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.5:*:*:*:*:*:*:*", + "matchCriteriaId": "EEA3B9F4-BD8E-488B-A362-0B86BC6DA275" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.6:*:*:*:*:*:*:*", - "matchCriteriaId": "9B0AC5E6-F4E3-41A9-A611-A0FAF11ABF68" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.6:*:*:*:*:*:*:*", + "matchCriteriaId": "6A91BD4A-76BD-40B9-9E12-22CACAAE42BF" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.7:*:*:*:*:*:*:*", - "matchCriteriaId": "832D5058-86F2-4FAA-A06D-AE1ED3A4C3B5" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.7:*:*:*:*:*:*:*", + "matchCriteriaId": "84CEB297-BEE9-4BBC-BA91-6AF14DCCA87C" } ] } diff --git a/CVE-2013/CVE-2013-17xx/CVE-2013-1718.json b/CVE-2013/CVE-2013-17xx/CVE-2013-1718.json index 4e2123f6e7e..4cb7be8387e 100644 --- a/CVE-2013/CVE-2013-17xx/CVE-2013-1718.json +++ b/CVE-2013/CVE-2013-17xx/CVE-2013-1718.json @@ -2,7 +2,7 @@ "id": "CVE-2013-1718", "sourceIdentifier": "security@mozilla.org", "published": "2013-09-18T10:08:22.337", - "lastModified": "2017-09-19T01:36:12.840", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -746,48 +746,48 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0:*:*:*:*:*:*:*", - "matchCriteriaId": "D9BBC7F8-D102-403F-8A88-AF279536E2F0" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0:*:*:*:*:*:*:*", + "matchCriteriaId": "3283FBAC-B77A-4C62-9D51-70BB35FA3D13" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "DFDAC701-5E69-4633-8CE4-04B8AFCC10C2" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "886D8A1F-ECDD-4FE9-A4E5-2322EEC0B880" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "83D5CFC4-C5DD-4747-985A-BC7A8E7C6EF7" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "E10B8803-C319-4AAA-81CF-FA206A33BA55" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.3:*:*:*:*:*:*:*", - "matchCriteriaId": "D5AFA78C-71F3-4E64-8A8F-5BA028F04037" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.3:*:*:*:*:*:*:*", + "matchCriteriaId": "E2B5567C-8969-456D-B6DF-3562B99C41FE" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.4:*:*:*:*:*:*:*", - "matchCriteriaId": "F99963C6-175B-4099-86F4-BADCA43DB41F" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.4:*:*:*:*:*:*:*", + "matchCriteriaId": "5657779C-19F9-42B8-BBBD-292B898E8FD2" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.5:*:*:*:*:*:*:*", - "matchCriteriaId": "96530DB0-8A9E-48FD-A5C5-28FD467568B2" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.5:*:*:*:*:*:*:*", + "matchCriteriaId": "EEA3B9F4-BD8E-488B-A362-0B86BC6DA275" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.6:*:*:*:*:*:*:*", - "matchCriteriaId": "9B0AC5E6-F4E3-41A9-A611-A0FAF11ABF68" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.6:*:*:*:*:*:*:*", + "matchCriteriaId": "6A91BD4A-76BD-40B9-9E12-22CACAAE42BF" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.7:*:*:*:*:*:*:*", - "matchCriteriaId": "832D5058-86F2-4FAA-A06D-AE1ED3A4C3B5" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.7:*:*:*:*:*:*:*", + "matchCriteriaId": "84CEB297-BEE9-4BBC-BA91-6AF14DCCA87C" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.8:*:*:*:*:*:*:*", - "matchCriteriaId": "772717C5-2A43-4064-9A21-C6A9B4F12CE9" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.8:*:*:*:*:*:*:*", + "matchCriteriaId": "C1890BA0-0BCD-4B24-805A-7580884CE5B3" } ] } diff --git a/CVE-2013/CVE-2013-17xx/CVE-2013-1722.json b/CVE-2013/CVE-2013-17xx/CVE-2013-1722.json index 513e1cdf6f2..2e3db866876 100644 --- a/CVE-2013/CVE-2013-17xx/CVE-2013-1722.json +++ b/CVE-2013/CVE-2013-17xx/CVE-2013-1722.json @@ -2,7 +2,7 @@ "id": "CVE-2013-1722", "sourceIdentifier": "security@mozilla.org", "published": "2013-09-18T10:08:24.397", - "lastModified": "2017-09-19T01:36:13.233", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -235,48 +235,48 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0:*:*:*:*:*:*:*", - "matchCriteriaId": "D9BBC7F8-D102-403F-8A88-AF279536E2F0" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0:*:*:*:*:*:*:*", + "matchCriteriaId": "3283FBAC-B77A-4C62-9D51-70BB35FA3D13" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "DFDAC701-5E69-4633-8CE4-04B8AFCC10C2" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "886D8A1F-ECDD-4FE9-A4E5-2322EEC0B880" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "83D5CFC4-C5DD-4747-985A-BC7A8E7C6EF7" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "E10B8803-C319-4AAA-81CF-FA206A33BA55" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.3:*:*:*:*:*:*:*", - "matchCriteriaId": "D5AFA78C-71F3-4E64-8A8F-5BA028F04037" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.3:*:*:*:*:*:*:*", + "matchCriteriaId": "E2B5567C-8969-456D-B6DF-3562B99C41FE" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.4:*:*:*:*:*:*:*", - "matchCriteriaId": "F99963C6-175B-4099-86F4-BADCA43DB41F" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.4:*:*:*:*:*:*:*", + "matchCriteriaId": "5657779C-19F9-42B8-BBBD-292B898E8FD2" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.5:*:*:*:*:*:*:*", - "matchCriteriaId": "96530DB0-8A9E-48FD-A5C5-28FD467568B2" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.5:*:*:*:*:*:*:*", + "matchCriteriaId": "EEA3B9F4-BD8E-488B-A362-0B86BC6DA275" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.6:*:*:*:*:*:*:*", - "matchCriteriaId": "9B0AC5E6-F4E3-41A9-A611-A0FAF11ABF68" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.6:*:*:*:*:*:*:*", + "matchCriteriaId": "6A91BD4A-76BD-40B9-9E12-22CACAAE42BF" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.7:*:*:*:*:*:*:*", - "matchCriteriaId": "832D5058-86F2-4FAA-A06D-AE1ED3A4C3B5" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.7:*:*:*:*:*:*:*", + "matchCriteriaId": "84CEB297-BEE9-4BBC-BA91-6AF14DCCA87C" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.8:*:*:*:*:*:*:*", - "matchCriteriaId": "772717C5-2A43-4064-9A21-C6A9B4F12CE9" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.8:*:*:*:*:*:*:*", + "matchCriteriaId": "C1890BA0-0BCD-4B24-805A-7580884CE5B3" } ] } diff --git a/CVE-2013/CVE-2013-17xx/CVE-2013-1725.json b/CVE-2013/CVE-2013-17xx/CVE-2013-1725.json index 9691332be52..d2988274c09 100644 --- a/CVE-2013/CVE-2013-17xx/CVE-2013-1725.json +++ b/CVE-2013/CVE-2013-17xx/CVE-2013-1725.json @@ -2,7 +2,7 @@ "id": "CVE-2013-1725", "sourceIdentifier": "security@mozilla.org", "published": "2013-09-18T10:08:24.460", - "lastModified": "2017-09-19T01:36:13.497", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -685,48 +685,48 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0:*:*:*:*:*:*:*", - "matchCriteriaId": "D9BBC7F8-D102-403F-8A88-AF279536E2F0" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0:*:*:*:*:*:*:*", + "matchCriteriaId": "3283FBAC-B77A-4C62-9D51-70BB35FA3D13" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "DFDAC701-5E69-4633-8CE4-04B8AFCC10C2" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "886D8A1F-ECDD-4FE9-A4E5-2322EEC0B880" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "83D5CFC4-C5DD-4747-985A-BC7A8E7C6EF7" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "E10B8803-C319-4AAA-81CF-FA206A33BA55" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.3:*:*:*:*:*:*:*", - "matchCriteriaId": "D5AFA78C-71F3-4E64-8A8F-5BA028F04037" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.3:*:*:*:*:*:*:*", + "matchCriteriaId": "E2B5567C-8969-456D-B6DF-3562B99C41FE" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.4:*:*:*:*:*:*:*", - "matchCriteriaId": "F99963C6-175B-4099-86F4-BADCA43DB41F" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.4:*:*:*:*:*:*:*", + "matchCriteriaId": "5657779C-19F9-42B8-BBBD-292B898E8FD2" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.5:*:*:*:*:*:*:*", - "matchCriteriaId": "96530DB0-8A9E-48FD-A5C5-28FD467568B2" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.5:*:*:*:*:*:*:*", + "matchCriteriaId": "EEA3B9F4-BD8E-488B-A362-0B86BC6DA275" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.6:*:*:*:*:*:*:*", - "matchCriteriaId": "9B0AC5E6-F4E3-41A9-A611-A0FAF11ABF68" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.6:*:*:*:*:*:*:*", + "matchCriteriaId": "6A91BD4A-76BD-40B9-9E12-22CACAAE42BF" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.7:*:*:*:*:*:*:*", - "matchCriteriaId": "832D5058-86F2-4FAA-A06D-AE1ED3A4C3B5" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.7:*:*:*:*:*:*:*", + "matchCriteriaId": "84CEB297-BEE9-4BBC-BA91-6AF14DCCA87C" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.8:*:*:*:*:*:*:*", - "matchCriteriaId": "772717C5-2A43-4064-9A21-C6A9B4F12CE9" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.8:*:*:*:*:*:*:*", + "matchCriteriaId": "C1890BA0-0BCD-4B24-805A-7580884CE5B3" } ] } diff --git a/CVE-2013/CVE-2013-17xx/CVE-2013-1726.json b/CVE-2013/CVE-2013-17xx/CVE-2013-1726.json index 1a5343726de..8f6edd2efde 100644 --- a/CVE-2013/CVE-2013-17xx/CVE-2013-1726.json +++ b/CVE-2013/CVE-2013-17xx/CVE-2013-1726.json @@ -2,7 +2,7 @@ "id": "CVE-2013-1726", "sourceIdentifier": "security@mozilla.org", "published": "2013-09-18T10:08:24.490", - "lastModified": "2017-09-19T01:36:13.577", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -235,48 +235,48 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0:*:*:*:*:*:*:*", - "matchCriteriaId": "D9BBC7F8-D102-403F-8A88-AF279536E2F0" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0:*:*:*:*:*:*:*", + "matchCriteriaId": "3283FBAC-B77A-4C62-9D51-70BB35FA3D13" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "DFDAC701-5E69-4633-8CE4-04B8AFCC10C2" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "886D8A1F-ECDD-4FE9-A4E5-2322EEC0B880" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "83D5CFC4-C5DD-4747-985A-BC7A8E7C6EF7" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "E10B8803-C319-4AAA-81CF-FA206A33BA55" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.3:*:*:*:*:*:*:*", - "matchCriteriaId": "D5AFA78C-71F3-4E64-8A8F-5BA028F04037" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.3:*:*:*:*:*:*:*", + "matchCriteriaId": "E2B5567C-8969-456D-B6DF-3562B99C41FE" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.4:*:*:*:*:*:*:*", - "matchCriteriaId": "F99963C6-175B-4099-86F4-BADCA43DB41F" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.4:*:*:*:*:*:*:*", + "matchCriteriaId": "5657779C-19F9-42B8-BBBD-292B898E8FD2" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.5:*:*:*:*:*:*:*", - "matchCriteriaId": "96530DB0-8A9E-48FD-A5C5-28FD467568B2" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.5:*:*:*:*:*:*:*", + "matchCriteriaId": "EEA3B9F4-BD8E-488B-A362-0B86BC6DA275" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.6:*:*:*:*:*:*:*", - "matchCriteriaId": "9B0AC5E6-F4E3-41A9-A611-A0FAF11ABF68" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.6:*:*:*:*:*:*:*", + "matchCriteriaId": "6A91BD4A-76BD-40B9-9E12-22CACAAE42BF" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.7:*:*:*:*:*:*:*", - "matchCriteriaId": "832D5058-86F2-4FAA-A06D-AE1ED3A4C3B5" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.7:*:*:*:*:*:*:*", + "matchCriteriaId": "84CEB297-BEE9-4BBC-BA91-6AF14DCCA87C" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.8:*:*:*:*:*:*:*", - "matchCriteriaId": "772717C5-2A43-4064-9A21-C6A9B4F12CE9" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.8:*:*:*:*:*:*:*", + "matchCriteriaId": "C1890BA0-0BCD-4B24-805A-7580884CE5B3" } ] } diff --git a/CVE-2013/CVE-2013-17xx/CVE-2013-1730.json b/CVE-2013/CVE-2013-17xx/CVE-2013-1730.json index 52b34c35037..5b549a77c89 100644 --- a/CVE-2013/CVE-2013-17xx/CVE-2013-1730.json +++ b/CVE-2013/CVE-2013-17xx/CVE-2013-1730.json @@ -2,7 +2,7 @@ "id": "CVE-2013-1730", "sourceIdentifier": "security@mozilla.org", "published": "2013-09-18T10:08:24.587", - "lastModified": "2017-09-19T01:36:13.763", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -635,48 +635,48 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0:*:*:*:*:*:*:*", - "matchCriteriaId": "D9BBC7F8-D102-403F-8A88-AF279536E2F0" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0:*:*:*:*:*:*:*", + "matchCriteriaId": "3283FBAC-B77A-4C62-9D51-70BB35FA3D13" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "DFDAC701-5E69-4633-8CE4-04B8AFCC10C2" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "886D8A1F-ECDD-4FE9-A4E5-2322EEC0B880" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "83D5CFC4-C5DD-4747-985A-BC7A8E7C6EF7" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "E10B8803-C319-4AAA-81CF-FA206A33BA55" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.3:*:*:*:*:*:*:*", - "matchCriteriaId": "D5AFA78C-71F3-4E64-8A8F-5BA028F04037" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.3:*:*:*:*:*:*:*", + "matchCriteriaId": "E2B5567C-8969-456D-B6DF-3562B99C41FE" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.4:*:*:*:*:*:*:*", - "matchCriteriaId": "F99963C6-175B-4099-86F4-BADCA43DB41F" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.4:*:*:*:*:*:*:*", + "matchCriteriaId": "5657779C-19F9-42B8-BBBD-292B898E8FD2" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.5:*:*:*:*:*:*:*", - "matchCriteriaId": "96530DB0-8A9E-48FD-A5C5-28FD467568B2" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.5:*:*:*:*:*:*:*", + "matchCriteriaId": "EEA3B9F4-BD8E-488B-A362-0B86BC6DA275" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.6:*:*:*:*:*:*:*", - "matchCriteriaId": "9B0AC5E6-F4E3-41A9-A611-A0FAF11ABF68" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.6:*:*:*:*:*:*:*", + "matchCriteriaId": "6A91BD4A-76BD-40B9-9E12-22CACAAE42BF" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.7:*:*:*:*:*:*:*", - "matchCriteriaId": "832D5058-86F2-4FAA-A06D-AE1ED3A4C3B5" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.7:*:*:*:*:*:*:*", + "matchCriteriaId": "84CEB297-BEE9-4BBC-BA91-6AF14DCCA87C" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.8:*:*:*:*:*:*:*", - "matchCriteriaId": "772717C5-2A43-4064-9A21-C6A9B4F12CE9" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.8:*:*:*:*:*:*:*", + "matchCriteriaId": "C1890BA0-0BCD-4B24-805A-7580884CE5B3" } ] } diff --git a/CVE-2013/CVE-2013-17xx/CVE-2013-1732.json b/CVE-2013/CVE-2013-17xx/CVE-2013-1732.json index 573f41d6401..0948ee70f99 100644 --- a/CVE-2013/CVE-2013-17xx/CVE-2013-1732.json +++ b/CVE-2013/CVE-2013-17xx/CVE-2013-1732.json @@ -2,7 +2,7 @@ "id": "CVE-2013-1732", "sourceIdentifier": "security@mozilla.org", "published": "2013-09-18T10:08:24.633", - "lastModified": "2017-09-19T01:36:13.840", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -119,48 +119,48 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0:*:*:*:*:*:*:*", - "matchCriteriaId": "D9BBC7F8-D102-403F-8A88-AF279536E2F0" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0:*:*:*:*:*:*:*", + "matchCriteriaId": "3283FBAC-B77A-4C62-9D51-70BB35FA3D13" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "DFDAC701-5E69-4633-8CE4-04B8AFCC10C2" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "886D8A1F-ECDD-4FE9-A4E5-2322EEC0B880" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "83D5CFC4-C5DD-4747-985A-BC7A8E7C6EF7" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "E10B8803-C319-4AAA-81CF-FA206A33BA55" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.3:*:*:*:*:*:*:*", - "matchCriteriaId": "D5AFA78C-71F3-4E64-8A8F-5BA028F04037" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.3:*:*:*:*:*:*:*", + "matchCriteriaId": "E2B5567C-8969-456D-B6DF-3562B99C41FE" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.4:*:*:*:*:*:*:*", - "matchCriteriaId": "F99963C6-175B-4099-86F4-BADCA43DB41F" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.4:*:*:*:*:*:*:*", + "matchCriteriaId": "5657779C-19F9-42B8-BBBD-292B898E8FD2" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.5:*:*:*:*:*:*:*", - "matchCriteriaId": "96530DB0-8A9E-48FD-A5C5-28FD467568B2" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.5:*:*:*:*:*:*:*", + "matchCriteriaId": "EEA3B9F4-BD8E-488B-A362-0B86BC6DA275" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.6:*:*:*:*:*:*:*", - "matchCriteriaId": "9B0AC5E6-F4E3-41A9-A611-A0FAF11ABF68" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.6:*:*:*:*:*:*:*", + "matchCriteriaId": "6A91BD4A-76BD-40B9-9E12-22CACAAE42BF" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.7:*:*:*:*:*:*:*", - "matchCriteriaId": "832D5058-86F2-4FAA-A06D-AE1ED3A4C3B5" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.7:*:*:*:*:*:*:*", + "matchCriteriaId": "84CEB297-BEE9-4BBC-BA91-6AF14DCCA87C" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.8:*:*:*:*:*:*:*", - "matchCriteriaId": "772717C5-2A43-4064-9A21-C6A9B4F12CE9" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.8:*:*:*:*:*:*:*", + "matchCriteriaId": "C1890BA0-0BCD-4B24-805A-7580884CE5B3" } ] } diff --git a/CVE-2013/CVE-2013-17xx/CVE-2013-1735.json b/CVE-2013/CVE-2013-17xx/CVE-2013-1735.json index e9703f62f8f..49271417ba3 100644 --- a/CVE-2013/CVE-2013-17xx/CVE-2013-1735.json +++ b/CVE-2013/CVE-2013-17xx/CVE-2013-1735.json @@ -2,7 +2,7 @@ "id": "CVE-2013-1735", "sourceIdentifier": "security@mozilla.org", "published": "2013-09-18T10:08:24.693", - "lastModified": "2017-09-19T01:36:13.937", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -119,48 +119,48 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0:*:*:*:*:*:*:*", - "matchCriteriaId": "D9BBC7F8-D102-403F-8A88-AF279536E2F0" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0:*:*:*:*:*:*:*", + "matchCriteriaId": "3283FBAC-B77A-4C62-9D51-70BB35FA3D13" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "DFDAC701-5E69-4633-8CE4-04B8AFCC10C2" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "886D8A1F-ECDD-4FE9-A4E5-2322EEC0B880" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "83D5CFC4-C5DD-4747-985A-BC7A8E7C6EF7" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "E10B8803-C319-4AAA-81CF-FA206A33BA55" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.3:*:*:*:*:*:*:*", - "matchCriteriaId": "D5AFA78C-71F3-4E64-8A8F-5BA028F04037" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.3:*:*:*:*:*:*:*", + "matchCriteriaId": "E2B5567C-8969-456D-B6DF-3562B99C41FE" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.4:*:*:*:*:*:*:*", - "matchCriteriaId": "F99963C6-175B-4099-86F4-BADCA43DB41F" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.4:*:*:*:*:*:*:*", + "matchCriteriaId": "5657779C-19F9-42B8-BBBD-292B898E8FD2" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.5:*:*:*:*:*:*:*", - "matchCriteriaId": "96530DB0-8A9E-48FD-A5C5-28FD467568B2" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.5:*:*:*:*:*:*:*", + "matchCriteriaId": "EEA3B9F4-BD8E-488B-A362-0B86BC6DA275" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.6:*:*:*:*:*:*:*", - "matchCriteriaId": "9B0AC5E6-F4E3-41A9-A611-A0FAF11ABF68" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.6:*:*:*:*:*:*:*", + "matchCriteriaId": "6A91BD4A-76BD-40B9-9E12-22CACAAE42BF" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.7:*:*:*:*:*:*:*", - "matchCriteriaId": "832D5058-86F2-4FAA-A06D-AE1ED3A4C3B5" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.7:*:*:*:*:*:*:*", + "matchCriteriaId": "84CEB297-BEE9-4BBC-BA91-6AF14DCCA87C" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.8:*:*:*:*:*:*:*", - "matchCriteriaId": "772717C5-2A43-4064-9A21-C6A9B4F12CE9" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.8:*:*:*:*:*:*:*", + "matchCriteriaId": "C1890BA0-0BCD-4B24-805A-7580884CE5B3" } ] } diff --git a/CVE-2013/CVE-2013-17xx/CVE-2013-1736.json b/CVE-2013/CVE-2013-17xx/CVE-2013-1736.json index df1d980cc36..e9a96db7c3f 100644 --- a/CVE-2013/CVE-2013-17xx/CVE-2013-1736.json +++ b/CVE-2013/CVE-2013-17xx/CVE-2013-1736.json @@ -2,7 +2,7 @@ "id": "CVE-2013-1736", "sourceIdentifier": "security@mozilla.org", "published": "2013-09-18T10:08:24.710", - "lastModified": "2017-09-19T01:36:14.030", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -574,48 +574,48 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0:*:*:*:*:*:*:*", - "matchCriteriaId": "D9BBC7F8-D102-403F-8A88-AF279536E2F0" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0:*:*:*:*:*:*:*", + "matchCriteriaId": "3283FBAC-B77A-4C62-9D51-70BB35FA3D13" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "DFDAC701-5E69-4633-8CE4-04B8AFCC10C2" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "886D8A1F-ECDD-4FE9-A4E5-2322EEC0B880" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "83D5CFC4-C5DD-4747-985A-BC7A8E7C6EF7" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "E10B8803-C319-4AAA-81CF-FA206A33BA55" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.3:*:*:*:*:*:*:*", - "matchCriteriaId": "D5AFA78C-71F3-4E64-8A8F-5BA028F04037" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.3:*:*:*:*:*:*:*", + "matchCriteriaId": "E2B5567C-8969-456D-B6DF-3562B99C41FE" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.4:*:*:*:*:*:*:*", - "matchCriteriaId": "F99963C6-175B-4099-86F4-BADCA43DB41F" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.4:*:*:*:*:*:*:*", + "matchCriteriaId": "5657779C-19F9-42B8-BBBD-292B898E8FD2" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.5:*:*:*:*:*:*:*", - "matchCriteriaId": "96530DB0-8A9E-48FD-A5C5-28FD467568B2" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.5:*:*:*:*:*:*:*", + "matchCriteriaId": "EEA3B9F4-BD8E-488B-A362-0B86BC6DA275" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.6:*:*:*:*:*:*:*", - "matchCriteriaId": "9B0AC5E6-F4E3-41A9-A611-A0FAF11ABF68" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.6:*:*:*:*:*:*:*", + "matchCriteriaId": "6A91BD4A-76BD-40B9-9E12-22CACAAE42BF" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.7:*:*:*:*:*:*:*", - "matchCriteriaId": "832D5058-86F2-4FAA-A06D-AE1ED3A4C3B5" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.7:*:*:*:*:*:*:*", + "matchCriteriaId": "84CEB297-BEE9-4BBC-BA91-6AF14DCCA87C" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.8:*:*:*:*:*:*:*", - "matchCriteriaId": "772717C5-2A43-4064-9A21-C6A9B4F12CE9" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.8:*:*:*:*:*:*:*", + "matchCriteriaId": "C1890BA0-0BCD-4B24-805A-7580884CE5B3" } ] } diff --git a/CVE-2013/CVE-2013-17xx/CVE-2013-1737.json b/CVE-2013/CVE-2013-17xx/CVE-2013-1737.json index 36ab3890e63..7f8cb9e11d2 100644 --- a/CVE-2013/CVE-2013-17xx/CVE-2013-1737.json +++ b/CVE-2013/CVE-2013-17xx/CVE-2013-1737.json @@ -2,7 +2,7 @@ "id": "CVE-2013-1737", "sourceIdentifier": "security@mozilla.org", "published": "2013-09-18T10:08:24.740", - "lastModified": "2017-09-19T01:36:14.123", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -629,48 +629,48 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0:*:*:*:*:*:*:*", - "matchCriteriaId": "D9BBC7F8-D102-403F-8A88-AF279536E2F0" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0:*:*:*:*:*:*:*", + "matchCriteriaId": "3283FBAC-B77A-4C62-9D51-70BB35FA3D13" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "DFDAC701-5E69-4633-8CE4-04B8AFCC10C2" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "886D8A1F-ECDD-4FE9-A4E5-2322EEC0B880" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "83D5CFC4-C5DD-4747-985A-BC7A8E7C6EF7" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "E10B8803-C319-4AAA-81CF-FA206A33BA55" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.3:*:*:*:*:*:*:*", - "matchCriteriaId": "D5AFA78C-71F3-4E64-8A8F-5BA028F04037" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.3:*:*:*:*:*:*:*", + "matchCriteriaId": "E2B5567C-8969-456D-B6DF-3562B99C41FE" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.4:*:*:*:*:*:*:*", - "matchCriteriaId": "F99963C6-175B-4099-86F4-BADCA43DB41F" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.4:*:*:*:*:*:*:*", + "matchCriteriaId": "5657779C-19F9-42B8-BBBD-292B898E8FD2" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.5:*:*:*:*:*:*:*", - "matchCriteriaId": "96530DB0-8A9E-48FD-A5C5-28FD467568B2" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.5:*:*:*:*:*:*:*", + "matchCriteriaId": "EEA3B9F4-BD8E-488B-A362-0B86BC6DA275" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.6:*:*:*:*:*:*:*", - "matchCriteriaId": "9B0AC5E6-F4E3-41A9-A611-A0FAF11ABF68" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.6:*:*:*:*:*:*:*", + "matchCriteriaId": "6A91BD4A-76BD-40B9-9E12-22CACAAE42BF" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.7:*:*:*:*:*:*:*", - "matchCriteriaId": "832D5058-86F2-4FAA-A06D-AE1ED3A4C3B5" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.7:*:*:*:*:*:*:*", + "matchCriteriaId": "84CEB297-BEE9-4BBC-BA91-6AF14DCCA87C" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.8:*:*:*:*:*:*:*", - "matchCriteriaId": "772717C5-2A43-4064-9A21-C6A9B4F12CE9" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.8:*:*:*:*:*:*:*", + "matchCriteriaId": "C1890BA0-0BCD-4B24-805A-7580884CE5B3" } ] } diff --git a/CVE-2013/CVE-2013-25xx/CVE-2013-2566.json b/CVE-2013/CVE-2013-25xx/CVE-2013-2566.json index da23b01eeb7..4e817de2d4b 100644 --- a/CVE-2013/CVE-2013-25xx/CVE-2013-2566.json +++ b/CVE-2013/CVE-2013-25xx/CVE-2013-2566.json @@ -2,7 +2,7 @@ "id": "CVE-2013-2566", "sourceIdentifier": "cve@mitre.org", "published": "2013-03-15T21:55:01.047", - "lastModified": "2020-11-23T19:48:41.097", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -401,6 +401,12 @@ "operator": "OR", "negate": false, "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", + "versionEndExcluding": "17.0.11", + "matchCriteriaId": "74242CE4-EB52-4765-A5E9-94C808EFC997" + }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", @@ -409,16 +415,10 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", - "versionEndExcluding": "17.0.11", - "matchCriteriaId": "062F30CA-6B38-49CA-8F62-CF20EF7E4D0E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "versionStartIncluding": "24.1.0", "versionEndExcluding": "24.1.1", - "matchCriteriaId": "A371727A-F400-43DB-AACF-17909C73DDFD" + "matchCriteriaId": "F7236D2E-3A8D-48DF-817E-0B536EF66891" }, { "vulnerable": true, diff --git a/CVE-2013/CVE-2013-55xx/CVE-2013-5590.json b/CVE-2013/CVE-2013-55xx/CVE-2013-5590.json index 746cda48c44..aa559103a89 100644 --- a/CVE-2013/CVE-2013-55xx/CVE-2013-5590.json +++ b/CVE-2013/CVE-2013-55xx/CVE-2013-5590.json @@ -2,7 +2,7 @@ "id": "CVE-2013-5590", "sourceIdentifier": "security@mozilla.org", "published": "2013-10-30T10:55:04.380", - "lastModified": "2018-10-30T16:26:10.390", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -594,58 +594,58 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0:*:*:*:*:*:*:*", - "matchCriteriaId": "D9BBC7F8-D102-403F-8A88-AF279536E2F0" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0:*:*:*:*:*:*:*", + "matchCriteriaId": "3283FBAC-B77A-4C62-9D51-70BB35FA3D13" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "DFDAC701-5E69-4633-8CE4-04B8AFCC10C2" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "886D8A1F-ECDD-4FE9-A4E5-2322EEC0B880" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "83D5CFC4-C5DD-4747-985A-BC7A8E7C6EF7" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "E10B8803-C319-4AAA-81CF-FA206A33BA55" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.3:*:*:*:*:*:*:*", - "matchCriteriaId": "D5AFA78C-71F3-4E64-8A8F-5BA028F04037" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.3:*:*:*:*:*:*:*", + "matchCriteriaId": "E2B5567C-8969-456D-B6DF-3562B99C41FE" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.4:*:*:*:*:*:*:*", - "matchCriteriaId": "F99963C6-175B-4099-86F4-BADCA43DB41F" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.4:*:*:*:*:*:*:*", + "matchCriteriaId": "5657779C-19F9-42B8-BBBD-292B898E8FD2" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.5:*:*:*:*:*:*:*", - "matchCriteriaId": "96530DB0-8A9E-48FD-A5C5-28FD467568B2" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.5:*:*:*:*:*:*:*", + "matchCriteriaId": "EEA3B9F4-BD8E-488B-A362-0B86BC6DA275" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.6:*:*:*:*:*:*:*", - "matchCriteriaId": "9B0AC5E6-F4E3-41A9-A611-A0FAF11ABF68" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.6:*:*:*:*:*:*:*", + "matchCriteriaId": "6A91BD4A-76BD-40B9-9E12-22CACAAE42BF" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.7:*:*:*:*:*:*:*", - "matchCriteriaId": "832D5058-86F2-4FAA-A06D-AE1ED3A4C3B5" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.7:*:*:*:*:*:*:*", + "matchCriteriaId": "84CEB297-BEE9-4BBC-BA91-6AF14DCCA87C" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.8:*:*:*:*:*:*:*", - "matchCriteriaId": "772717C5-2A43-4064-9A21-C6A9B4F12CE9" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.8:*:*:*:*:*:*:*", + "matchCriteriaId": "C1890BA0-0BCD-4B24-805A-7580884CE5B3" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.9:*:*:*:*:*:*:*", - "matchCriteriaId": "B85ADCE5-3C9A-47C8-BB57-307A4813DD9A" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.9:*:*:*:*:*:*:*", + "matchCriteriaId": "4154D7D4-DAD7-46DB-A2A7-5A3702939865" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:24.0:*:*:*:*:*:*:*", - "matchCriteriaId": "4142C9EE-7094-4CD5-A781-30B91AF28855" + "criteria": "cpe:2.3:a:mozilla:firefox:24.0:*:*:*:*:*:*:*", + "matchCriteriaId": "18E772D1-DD0F-4F04-8BB4-9550F3C601E1" }, { "vulnerable": true, diff --git a/CVE-2013/CVE-2013-55xx/CVE-2013-5591.json b/CVE-2013/CVE-2013-55xx/CVE-2013-5591.json index c6e041f1ee5..dd8f2ce0c83 100644 --- a/CVE-2013/CVE-2013-55xx/CVE-2013-5591.json +++ b/CVE-2013/CVE-2013-55xx/CVE-2013-5591.json @@ -2,7 +2,7 @@ "id": "CVE-2013-5591", "sourceIdentifier": "security@mozilla.org", "published": "2013-10-30T10:55:04.397", - "lastModified": "2018-10-30T16:26:10.390", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -195,8 +195,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:24.0:*:*:*:*:*:*:*", - "matchCriteriaId": "4142C9EE-7094-4CD5-A781-30B91AF28855" + "criteria": "cpe:2.3:a:mozilla:firefox:24.0:*:*:*:*:*:*:*", + "matchCriteriaId": "18E772D1-DD0F-4F04-8BB4-9550F3C601E1" }, { "vulnerable": true, diff --git a/CVE-2013/CVE-2013-55xx/CVE-2013-5593.json b/CVE-2013/CVE-2013-55xx/CVE-2013-5593.json index 1c51e3c805e..7556c4322a5 100644 --- a/CVE-2013/CVE-2013-55xx/CVE-2013-5593.json +++ b/CVE-2013/CVE-2013-55xx/CVE-2013-5593.json @@ -2,7 +2,7 @@ "id": "CVE-2013-5593", "sourceIdentifier": "security@mozilla.org", "published": "2013-10-30T10:55:04.443", - "lastModified": "2018-10-30T16:26:10.390", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -63,8 +63,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:24.0:*:*:*:*:*:*:*", - "matchCriteriaId": "4142C9EE-7094-4CD5-A781-30B91AF28855" + "criteria": "cpe:2.3:a:mozilla:firefox:24.0:*:*:*:*:*:*:*", + "matchCriteriaId": "18E772D1-DD0F-4F04-8BB4-9550F3C601E1" }, { "vulnerable": true, diff --git a/CVE-2013/CVE-2013-55xx/CVE-2013-5595.json b/CVE-2013/CVE-2013-55xx/CVE-2013-5595.json index f1c9783c9ef..032a980db6e 100644 --- a/CVE-2013/CVE-2013-55xx/CVE-2013-5595.json +++ b/CVE-2013/CVE-2013-55xx/CVE-2013-5595.json @@ -2,7 +2,7 @@ "id": "CVE-2013-5595", "sourceIdentifier": "security@mozilla.org", "published": "2013-10-30T10:55:04.460", - "lastModified": "2017-09-19T01:36:48.420", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -715,58 +715,58 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0:*:*:*:*:*:*:*", - "matchCriteriaId": "D9BBC7F8-D102-403F-8A88-AF279536E2F0" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0:*:*:*:*:*:*:*", + "matchCriteriaId": "3283FBAC-B77A-4C62-9D51-70BB35FA3D13" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "DFDAC701-5E69-4633-8CE4-04B8AFCC10C2" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "886D8A1F-ECDD-4FE9-A4E5-2322EEC0B880" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "83D5CFC4-C5DD-4747-985A-BC7A8E7C6EF7" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "E10B8803-C319-4AAA-81CF-FA206A33BA55" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.3:*:*:*:*:*:*:*", - "matchCriteriaId": "D5AFA78C-71F3-4E64-8A8F-5BA028F04037" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.3:*:*:*:*:*:*:*", + "matchCriteriaId": "E2B5567C-8969-456D-B6DF-3562B99C41FE" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.4:*:*:*:*:*:*:*", - "matchCriteriaId": "F99963C6-175B-4099-86F4-BADCA43DB41F" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.4:*:*:*:*:*:*:*", + "matchCriteriaId": "5657779C-19F9-42B8-BBBD-292B898E8FD2" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.5:*:*:*:*:*:*:*", - "matchCriteriaId": "96530DB0-8A9E-48FD-A5C5-28FD467568B2" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.5:*:*:*:*:*:*:*", + "matchCriteriaId": "EEA3B9F4-BD8E-488B-A362-0B86BC6DA275" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.6:*:*:*:*:*:*:*", - "matchCriteriaId": "9B0AC5E6-F4E3-41A9-A611-A0FAF11ABF68" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.6:*:*:*:*:*:*:*", + "matchCriteriaId": "6A91BD4A-76BD-40B9-9E12-22CACAAE42BF" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.7:*:*:*:*:*:*:*", - "matchCriteriaId": "832D5058-86F2-4FAA-A06D-AE1ED3A4C3B5" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.7:*:*:*:*:*:*:*", + "matchCriteriaId": "84CEB297-BEE9-4BBC-BA91-6AF14DCCA87C" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.8:*:*:*:*:*:*:*", - "matchCriteriaId": "772717C5-2A43-4064-9A21-C6A9B4F12CE9" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.8:*:*:*:*:*:*:*", + "matchCriteriaId": "C1890BA0-0BCD-4B24-805A-7580884CE5B3" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.9:*:*:*:*:*:*:*", - "matchCriteriaId": "B85ADCE5-3C9A-47C8-BB57-307A4813DD9A" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.9:*:*:*:*:*:*:*", + "matchCriteriaId": "4154D7D4-DAD7-46DB-A2A7-5A3702939865" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:24.0:*:*:*:*:*:*:*", - "matchCriteriaId": "4142C9EE-7094-4CD5-A781-30B91AF28855" + "criteria": "cpe:2.3:a:mozilla:firefox:24.0:*:*:*:*:*:*:*", + "matchCriteriaId": "18E772D1-DD0F-4F04-8BB4-9550F3C601E1" }, { "vulnerable": true, diff --git a/CVE-2013/CVE-2013-55xx/CVE-2013-5596.json b/CVE-2013/CVE-2013-55xx/CVE-2013-5596.json index 703f90e3258..b131ed91329 100644 --- a/CVE-2013/CVE-2013-55xx/CVE-2013-5596.json +++ b/CVE-2013/CVE-2013-55xx/CVE-2013-5596.json @@ -2,7 +2,7 @@ "id": "CVE-2013-5596", "sourceIdentifier": "security@mozilla.org", "published": "2013-10-30T10:55:04.477", - "lastModified": "2018-10-30T16:26:10.390", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -134,8 +134,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:24.0:*:*:*:*:*:*:*", - "matchCriteriaId": "4142C9EE-7094-4CD5-A781-30B91AF28855" + "criteria": "cpe:2.3:a:mozilla:firefox:24.0:*:*:*:*:*:*:*", + "matchCriteriaId": "18E772D1-DD0F-4F04-8BB4-9550F3C601E1" }, { "vulnerable": true, diff --git a/CVE-2013/CVE-2013-55xx/CVE-2013-5597.json b/CVE-2013/CVE-2013-55xx/CVE-2013-5597.json index 96b742e32fc..291a2ca6804 100644 --- a/CVE-2013/CVE-2013-55xx/CVE-2013-5597.json +++ b/CVE-2013/CVE-2013-55xx/CVE-2013-5597.json @@ -2,7 +2,7 @@ "id": "CVE-2013-5597", "sourceIdentifier": "security@mozilla.org", "published": "2013-10-30T10:55:04.490", - "lastModified": "2018-10-30T16:26:10.390", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "evaluatorComment": "CWE-416: Use After Free per http://cwe.mitre.org/data/definitions/416.html", @@ -195,58 +195,58 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0:*:*:*:*:*:*:*", - "matchCriteriaId": "D9BBC7F8-D102-403F-8A88-AF279536E2F0" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0:*:*:*:*:*:*:*", + "matchCriteriaId": "3283FBAC-B77A-4C62-9D51-70BB35FA3D13" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "DFDAC701-5E69-4633-8CE4-04B8AFCC10C2" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "886D8A1F-ECDD-4FE9-A4E5-2322EEC0B880" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "83D5CFC4-C5DD-4747-985A-BC7A8E7C6EF7" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "E10B8803-C319-4AAA-81CF-FA206A33BA55" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.3:*:*:*:*:*:*:*", - "matchCriteriaId": "D5AFA78C-71F3-4E64-8A8F-5BA028F04037" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.3:*:*:*:*:*:*:*", + "matchCriteriaId": "E2B5567C-8969-456D-B6DF-3562B99C41FE" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.4:*:*:*:*:*:*:*", - "matchCriteriaId": "F99963C6-175B-4099-86F4-BADCA43DB41F" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.4:*:*:*:*:*:*:*", + "matchCriteriaId": "5657779C-19F9-42B8-BBBD-292B898E8FD2" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.5:*:*:*:*:*:*:*", - "matchCriteriaId": "96530DB0-8A9E-48FD-A5C5-28FD467568B2" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.5:*:*:*:*:*:*:*", + "matchCriteriaId": "EEA3B9F4-BD8E-488B-A362-0B86BC6DA275" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.6:*:*:*:*:*:*:*", - "matchCriteriaId": "9B0AC5E6-F4E3-41A9-A611-A0FAF11ABF68" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.6:*:*:*:*:*:*:*", + "matchCriteriaId": "6A91BD4A-76BD-40B9-9E12-22CACAAE42BF" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.7:*:*:*:*:*:*:*", - "matchCriteriaId": "832D5058-86F2-4FAA-A06D-AE1ED3A4C3B5" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.7:*:*:*:*:*:*:*", + "matchCriteriaId": "84CEB297-BEE9-4BBC-BA91-6AF14DCCA87C" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.8:*:*:*:*:*:*:*", - "matchCriteriaId": "772717C5-2A43-4064-9A21-C6A9B4F12CE9" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.8:*:*:*:*:*:*:*", + "matchCriteriaId": "C1890BA0-0BCD-4B24-805A-7580884CE5B3" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.9:*:*:*:*:*:*:*", - "matchCriteriaId": "B85ADCE5-3C9A-47C8-BB57-307A4813DD9A" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.9:*:*:*:*:*:*:*", + "matchCriteriaId": "4154D7D4-DAD7-46DB-A2A7-5A3702939865" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:24.0:*:*:*:*:*:*:*", - "matchCriteriaId": "4142C9EE-7094-4CD5-A781-30B91AF28855" + "criteria": "cpe:2.3:a:mozilla:firefox:24.0:*:*:*:*:*:*:*", + "matchCriteriaId": "18E772D1-DD0F-4F04-8BB4-9550F3C601E1" }, { "vulnerable": true, diff --git a/CVE-2013/CVE-2013-55xx/CVE-2013-5598.json b/CVE-2013/CVE-2013-55xx/CVE-2013-5598.json index 4df250147fc..6c2c4c9fe8d 100644 --- a/CVE-2013/CVE-2013-55xx/CVE-2013-5598.json +++ b/CVE-2013/CVE-2013-55xx/CVE-2013-5598.json @@ -2,7 +2,7 @@ "id": "CVE-2013-5598", "sourceIdentifier": "security@mozilla.org", "published": "2013-10-30T10:55:04.507", - "lastModified": "2017-09-19T01:36:48.687", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -63,8 +63,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:24.0:*:*:*:*:*:*:*", - "matchCriteriaId": "4142C9EE-7094-4CD5-A781-30B91AF28855" + "criteria": "cpe:2.3:a:mozilla:firefox:24.0:*:*:*:*:*:*:*", + "matchCriteriaId": "18E772D1-DD0F-4F04-8BB4-9550F3C601E1" }, { "vulnerable": true, diff --git a/CVE-2013/CVE-2013-55xx/CVE-2013-5599.json b/CVE-2013/CVE-2013-55xx/CVE-2013-5599.json index f60efcf3206..75b5695498f 100644 --- a/CVE-2013/CVE-2013-55xx/CVE-2013-5599.json +++ b/CVE-2013/CVE-2013-55xx/CVE-2013-5599.json @@ -2,7 +2,7 @@ "id": "CVE-2013-5599", "sourceIdentifier": "security@mozilla.org", "published": "2013-10-30T10:55:04.520", - "lastModified": "2018-10-30T16:26:10.390", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "evaluatorComment": "CWE-416: Use After Free per http://cwe.mitre.org/data/definitions/416.html", @@ -787,58 +787,58 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0:*:*:*:*:*:*:*", - "matchCriteriaId": "D9BBC7F8-D102-403F-8A88-AF279536E2F0" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0:*:*:*:*:*:*:*", + "matchCriteriaId": "3283FBAC-B77A-4C62-9D51-70BB35FA3D13" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "DFDAC701-5E69-4633-8CE4-04B8AFCC10C2" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "886D8A1F-ECDD-4FE9-A4E5-2322EEC0B880" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "83D5CFC4-C5DD-4747-985A-BC7A8E7C6EF7" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "E10B8803-C319-4AAA-81CF-FA206A33BA55" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.3:*:*:*:*:*:*:*", - "matchCriteriaId": "D5AFA78C-71F3-4E64-8A8F-5BA028F04037" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.3:*:*:*:*:*:*:*", + "matchCriteriaId": "E2B5567C-8969-456D-B6DF-3562B99C41FE" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.4:*:*:*:*:*:*:*", - "matchCriteriaId": "F99963C6-175B-4099-86F4-BADCA43DB41F" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.4:*:*:*:*:*:*:*", + "matchCriteriaId": "5657779C-19F9-42B8-BBBD-292B898E8FD2" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.5:*:*:*:*:*:*:*", - "matchCriteriaId": "96530DB0-8A9E-48FD-A5C5-28FD467568B2" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.5:*:*:*:*:*:*:*", + "matchCriteriaId": "EEA3B9F4-BD8E-488B-A362-0B86BC6DA275" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.6:*:*:*:*:*:*:*", - "matchCriteriaId": "9B0AC5E6-F4E3-41A9-A611-A0FAF11ABF68" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.6:*:*:*:*:*:*:*", + "matchCriteriaId": "6A91BD4A-76BD-40B9-9E12-22CACAAE42BF" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.7:*:*:*:*:*:*:*", - "matchCriteriaId": "832D5058-86F2-4FAA-A06D-AE1ED3A4C3B5" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.7:*:*:*:*:*:*:*", + "matchCriteriaId": "84CEB297-BEE9-4BBC-BA91-6AF14DCCA87C" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.8:*:*:*:*:*:*:*", - "matchCriteriaId": "772717C5-2A43-4064-9A21-C6A9B4F12CE9" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.8:*:*:*:*:*:*:*", + "matchCriteriaId": "C1890BA0-0BCD-4B24-805A-7580884CE5B3" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.9:*:*:*:*:*:*:*", - "matchCriteriaId": "B85ADCE5-3C9A-47C8-BB57-307A4813DD9A" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.9:*:*:*:*:*:*:*", + "matchCriteriaId": "4154D7D4-DAD7-46DB-A2A7-5A3702939865" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:24.0:*:*:*:*:*:*:*", - "matchCriteriaId": "4142C9EE-7094-4CD5-A781-30B91AF28855" + "criteria": "cpe:2.3:a:mozilla:firefox:24.0:*:*:*:*:*:*:*", + "matchCriteriaId": "18E772D1-DD0F-4F04-8BB4-9550F3C601E1" }, { "vulnerable": true, diff --git a/CVE-2013/CVE-2013-56xx/CVE-2013-5600.json b/CVE-2013/CVE-2013-56xx/CVE-2013-5600.json index 72400e2da47..feb026879bd 100644 --- a/CVE-2013/CVE-2013-56xx/CVE-2013-5600.json +++ b/CVE-2013/CVE-2013-56xx/CVE-2013-5600.json @@ -2,7 +2,7 @@ "id": "CVE-2013-5600", "sourceIdentifier": "security@mozilla.org", "published": "2013-10-30T10:55:04.537", - "lastModified": "2018-10-30T16:26:10.390", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "evaluatorComment": "CWE-416: Use After Free per http://cwe.mitre.org/data/definitions/416.html", @@ -787,58 +787,58 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0:*:*:*:*:*:*:*", - "matchCriteriaId": "D9BBC7F8-D102-403F-8A88-AF279536E2F0" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0:*:*:*:*:*:*:*", + "matchCriteriaId": "3283FBAC-B77A-4C62-9D51-70BB35FA3D13" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "DFDAC701-5E69-4633-8CE4-04B8AFCC10C2" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "886D8A1F-ECDD-4FE9-A4E5-2322EEC0B880" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "83D5CFC4-C5DD-4747-985A-BC7A8E7C6EF7" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "E10B8803-C319-4AAA-81CF-FA206A33BA55" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.3:*:*:*:*:*:*:*", - "matchCriteriaId": "D5AFA78C-71F3-4E64-8A8F-5BA028F04037" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.3:*:*:*:*:*:*:*", + "matchCriteriaId": "E2B5567C-8969-456D-B6DF-3562B99C41FE" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.4:*:*:*:*:*:*:*", - "matchCriteriaId": "F99963C6-175B-4099-86F4-BADCA43DB41F" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.4:*:*:*:*:*:*:*", + "matchCriteriaId": "5657779C-19F9-42B8-BBBD-292B898E8FD2" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.5:*:*:*:*:*:*:*", - "matchCriteriaId": "96530DB0-8A9E-48FD-A5C5-28FD467568B2" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.5:*:*:*:*:*:*:*", + "matchCriteriaId": "EEA3B9F4-BD8E-488B-A362-0B86BC6DA275" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.6:*:*:*:*:*:*:*", - "matchCriteriaId": "9B0AC5E6-F4E3-41A9-A611-A0FAF11ABF68" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.6:*:*:*:*:*:*:*", + "matchCriteriaId": "6A91BD4A-76BD-40B9-9E12-22CACAAE42BF" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.7:*:*:*:*:*:*:*", - "matchCriteriaId": "832D5058-86F2-4FAA-A06D-AE1ED3A4C3B5" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.7:*:*:*:*:*:*:*", + "matchCriteriaId": "84CEB297-BEE9-4BBC-BA91-6AF14DCCA87C" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.8:*:*:*:*:*:*:*", - "matchCriteriaId": "772717C5-2A43-4064-9A21-C6A9B4F12CE9" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.8:*:*:*:*:*:*:*", + "matchCriteriaId": "C1890BA0-0BCD-4B24-805A-7580884CE5B3" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.9:*:*:*:*:*:*:*", - "matchCriteriaId": "B85ADCE5-3C9A-47C8-BB57-307A4813DD9A" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.9:*:*:*:*:*:*:*", + "matchCriteriaId": "4154D7D4-DAD7-46DB-A2A7-5A3702939865" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:24.0:*:*:*:*:*:*:*", - "matchCriteriaId": "4142C9EE-7094-4CD5-A781-30B91AF28855" + "criteria": "cpe:2.3:a:mozilla:firefox:24.0:*:*:*:*:*:*:*", + "matchCriteriaId": "18E772D1-DD0F-4F04-8BB4-9550F3C601E1" }, { "vulnerable": true, diff --git a/CVE-2013/CVE-2013-56xx/CVE-2013-5601.json b/CVE-2013/CVE-2013-56xx/CVE-2013-5601.json index ef20d25b7a8..772fb45b0c5 100644 --- a/CVE-2013/CVE-2013-56xx/CVE-2013-5601.json +++ b/CVE-2013/CVE-2013-56xx/CVE-2013-5601.json @@ -2,7 +2,7 @@ "id": "CVE-2013-5601", "sourceIdentifier": "security@mozilla.org", "published": "2013-10-30T10:55:04.553", - "lastModified": "2018-10-30T16:26:10.390", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "evaluatorComment": "CWE-416: Use After Free per http://cwe.mitre.org/data/definitions/416.html", @@ -727,58 +727,58 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0:*:*:*:*:*:*:*", - "matchCriteriaId": "D9BBC7F8-D102-403F-8A88-AF279536E2F0" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0:*:*:*:*:*:*:*", + "matchCriteriaId": "3283FBAC-B77A-4C62-9D51-70BB35FA3D13" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "DFDAC701-5E69-4633-8CE4-04B8AFCC10C2" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "886D8A1F-ECDD-4FE9-A4E5-2322EEC0B880" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "83D5CFC4-C5DD-4747-985A-BC7A8E7C6EF7" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "E10B8803-C319-4AAA-81CF-FA206A33BA55" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.3:*:*:*:*:*:*:*", - "matchCriteriaId": "D5AFA78C-71F3-4E64-8A8F-5BA028F04037" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.3:*:*:*:*:*:*:*", + "matchCriteriaId": "E2B5567C-8969-456D-B6DF-3562B99C41FE" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.4:*:*:*:*:*:*:*", - "matchCriteriaId": "F99963C6-175B-4099-86F4-BADCA43DB41F" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.4:*:*:*:*:*:*:*", + "matchCriteriaId": "5657779C-19F9-42B8-BBBD-292B898E8FD2" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.5:*:*:*:*:*:*:*", - "matchCriteriaId": "96530DB0-8A9E-48FD-A5C5-28FD467568B2" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.5:*:*:*:*:*:*:*", + "matchCriteriaId": "EEA3B9F4-BD8E-488B-A362-0B86BC6DA275" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.6:*:*:*:*:*:*:*", - "matchCriteriaId": "9B0AC5E6-F4E3-41A9-A611-A0FAF11ABF68" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.6:*:*:*:*:*:*:*", + "matchCriteriaId": "6A91BD4A-76BD-40B9-9E12-22CACAAE42BF" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.7:*:*:*:*:*:*:*", - "matchCriteriaId": "832D5058-86F2-4FAA-A06D-AE1ED3A4C3B5" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.7:*:*:*:*:*:*:*", + "matchCriteriaId": "84CEB297-BEE9-4BBC-BA91-6AF14DCCA87C" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.8:*:*:*:*:*:*:*", - "matchCriteriaId": "772717C5-2A43-4064-9A21-C6A9B4F12CE9" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.8:*:*:*:*:*:*:*", + "matchCriteriaId": "C1890BA0-0BCD-4B24-805A-7580884CE5B3" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.9:*:*:*:*:*:*:*", - "matchCriteriaId": "B85ADCE5-3C9A-47C8-BB57-307A4813DD9A" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.9:*:*:*:*:*:*:*", + "matchCriteriaId": "4154D7D4-DAD7-46DB-A2A7-5A3702939865" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:24.0:*:*:*:*:*:*:*", - "matchCriteriaId": "4142C9EE-7094-4CD5-A781-30B91AF28855" + "criteria": "cpe:2.3:a:mozilla:firefox:24.0:*:*:*:*:*:*:*", + "matchCriteriaId": "18E772D1-DD0F-4F04-8BB4-9550F3C601E1" }, { "vulnerable": true, diff --git a/CVE-2013/CVE-2013-56xx/CVE-2013-5602.json b/CVE-2013/CVE-2013-56xx/CVE-2013-5602.json index e7afd00953a..c746a07fa29 100644 --- a/CVE-2013/CVE-2013-56xx/CVE-2013-5602.json +++ b/CVE-2013/CVE-2013-56xx/CVE-2013-5602.json @@ -2,7 +2,7 @@ "id": "CVE-2013-5602", "sourceIdentifier": "security@mozilla.org", "published": "2013-10-30T10:55:04.567", - "lastModified": "2018-10-30T16:26:10.390", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -63,58 +63,58 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0:*:*:*:*:*:*:*", - "matchCriteriaId": "D9BBC7F8-D102-403F-8A88-AF279536E2F0" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0:*:*:*:*:*:*:*", + "matchCriteriaId": "3283FBAC-B77A-4C62-9D51-70BB35FA3D13" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "DFDAC701-5E69-4633-8CE4-04B8AFCC10C2" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "886D8A1F-ECDD-4FE9-A4E5-2322EEC0B880" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "83D5CFC4-C5DD-4747-985A-BC7A8E7C6EF7" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "E10B8803-C319-4AAA-81CF-FA206A33BA55" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.3:*:*:*:*:*:*:*", - "matchCriteriaId": "D5AFA78C-71F3-4E64-8A8F-5BA028F04037" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.3:*:*:*:*:*:*:*", + "matchCriteriaId": "E2B5567C-8969-456D-B6DF-3562B99C41FE" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.4:*:*:*:*:*:*:*", - "matchCriteriaId": "F99963C6-175B-4099-86F4-BADCA43DB41F" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.4:*:*:*:*:*:*:*", + "matchCriteriaId": "5657779C-19F9-42B8-BBBD-292B898E8FD2" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.5:*:*:*:*:*:*:*", - "matchCriteriaId": "96530DB0-8A9E-48FD-A5C5-28FD467568B2" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.5:*:*:*:*:*:*:*", + "matchCriteriaId": "EEA3B9F4-BD8E-488B-A362-0B86BC6DA275" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.6:*:*:*:*:*:*:*", - "matchCriteriaId": "9B0AC5E6-F4E3-41A9-A611-A0FAF11ABF68" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.6:*:*:*:*:*:*:*", + "matchCriteriaId": "6A91BD4A-76BD-40B9-9E12-22CACAAE42BF" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.7:*:*:*:*:*:*:*", - "matchCriteriaId": "832D5058-86F2-4FAA-A06D-AE1ED3A4C3B5" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.7:*:*:*:*:*:*:*", + "matchCriteriaId": "84CEB297-BEE9-4BBC-BA91-6AF14DCCA87C" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.8:*:*:*:*:*:*:*", - "matchCriteriaId": "772717C5-2A43-4064-9A21-C6A9B4F12CE9" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.8:*:*:*:*:*:*:*", + "matchCriteriaId": "C1890BA0-0BCD-4B24-805A-7580884CE5B3" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.9:*:*:*:*:*:*:*", - "matchCriteriaId": "B85ADCE5-3C9A-47C8-BB57-307A4813DD9A" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.9:*:*:*:*:*:*:*", + "matchCriteriaId": "4154D7D4-DAD7-46DB-A2A7-5A3702939865" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:24.0:*:*:*:*:*:*:*", - "matchCriteriaId": "4142C9EE-7094-4CD5-A781-30B91AF28855" + "criteria": "cpe:2.3:a:mozilla:firefox:24.0:*:*:*:*:*:*:*", + "matchCriteriaId": "18E772D1-DD0F-4F04-8BB4-9550F3C601E1" }, { "vulnerable": true, diff --git a/CVE-2013/CVE-2013-56xx/CVE-2013-5603.json b/CVE-2013/CVE-2013-56xx/CVE-2013-5603.json index 685ec207921..3c2552ce523 100644 --- a/CVE-2013/CVE-2013-56xx/CVE-2013-5603.json +++ b/CVE-2013/CVE-2013-56xx/CVE-2013-5603.json @@ -2,7 +2,7 @@ "id": "CVE-2013-5603", "sourceIdentifier": "security@mozilla.org", "published": "2013-10-30T10:55:04.583", - "lastModified": "2018-10-30T16:26:10.390", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "evaluatorComment": "CWE-416: Use After Free per http://cwe.mitre.org/data/definitions/416.html", @@ -135,8 +135,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:24.0:*:*:*:*:*:*:*", - "matchCriteriaId": "4142C9EE-7094-4CD5-A781-30B91AF28855" + "criteria": "cpe:2.3:a:mozilla:firefox:24.0:*:*:*:*:*:*:*", + "matchCriteriaId": "18E772D1-DD0F-4F04-8BB4-9550F3C601E1" }, { "vulnerable": true, diff --git a/CVE-2013/CVE-2013-56xx/CVE-2013-5604.json b/CVE-2013/CVE-2013-56xx/CVE-2013-5604.json index 90a41def0c0..1c8248f1cf8 100644 --- a/CVE-2013/CVE-2013-56xx/CVE-2013-5604.json +++ b/CVE-2013/CVE-2013-56xx/CVE-2013-5604.json @@ -2,7 +2,7 @@ "id": "CVE-2013-5604", "sourceIdentifier": "security@mozilla.org", "published": "2013-10-30T10:55:04.617", - "lastModified": "2018-10-30T16:26:10.390", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -654,58 +654,58 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0:*:*:*:*:*:*:*", - "matchCriteriaId": "D9BBC7F8-D102-403F-8A88-AF279536E2F0" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0:*:*:*:*:*:*:*", + "matchCriteriaId": "3283FBAC-B77A-4C62-9D51-70BB35FA3D13" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "DFDAC701-5E69-4633-8CE4-04B8AFCC10C2" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "886D8A1F-ECDD-4FE9-A4E5-2322EEC0B880" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "83D5CFC4-C5DD-4747-985A-BC7A8E7C6EF7" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "E10B8803-C319-4AAA-81CF-FA206A33BA55" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.3:*:*:*:*:*:*:*", - "matchCriteriaId": "D5AFA78C-71F3-4E64-8A8F-5BA028F04037" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.3:*:*:*:*:*:*:*", + "matchCriteriaId": "E2B5567C-8969-456D-B6DF-3562B99C41FE" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.4:*:*:*:*:*:*:*", - "matchCriteriaId": "F99963C6-175B-4099-86F4-BADCA43DB41F" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.4:*:*:*:*:*:*:*", + "matchCriteriaId": "5657779C-19F9-42B8-BBBD-292B898E8FD2" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.5:*:*:*:*:*:*:*", - "matchCriteriaId": "96530DB0-8A9E-48FD-A5C5-28FD467568B2" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.5:*:*:*:*:*:*:*", + "matchCriteriaId": "EEA3B9F4-BD8E-488B-A362-0B86BC6DA275" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.6:*:*:*:*:*:*:*", - "matchCriteriaId": "9B0AC5E6-F4E3-41A9-A611-A0FAF11ABF68" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.6:*:*:*:*:*:*:*", + "matchCriteriaId": "6A91BD4A-76BD-40B9-9E12-22CACAAE42BF" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.7:*:*:*:*:*:*:*", - "matchCriteriaId": "832D5058-86F2-4FAA-A06D-AE1ED3A4C3B5" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.7:*:*:*:*:*:*:*", + "matchCriteriaId": "84CEB297-BEE9-4BBC-BA91-6AF14DCCA87C" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.8:*:*:*:*:*:*:*", - "matchCriteriaId": "772717C5-2A43-4064-9A21-C6A9B4F12CE9" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.8:*:*:*:*:*:*:*", + "matchCriteriaId": "C1890BA0-0BCD-4B24-805A-7580884CE5B3" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.9:*:*:*:*:*:*:*", - "matchCriteriaId": "B85ADCE5-3C9A-47C8-BB57-307A4813DD9A" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.9:*:*:*:*:*:*:*", + "matchCriteriaId": "4154D7D4-DAD7-46DB-A2A7-5A3702939865" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:24.0:*:*:*:*:*:*:*", - "matchCriteriaId": "4142C9EE-7094-4CD5-A781-30B91AF28855" + "criteria": "cpe:2.3:a:mozilla:firefox:24.0:*:*:*:*:*:*:*", + "matchCriteriaId": "18E772D1-DD0F-4F04-8BB4-9550F3C601E1" }, { "vulnerable": true, diff --git a/CVE-2013/CVE-2013-56xx/CVE-2013-5607.json b/CVE-2013/CVE-2013-56xx/CVE-2013-5607.json index d8013a5d455..60988d3e05b 100644 --- a/CVE-2013/CVE-2013-56xx/CVE-2013-5607.json +++ b/CVE-2013/CVE-2013-56xx/CVE-2013-5607.json @@ -2,7 +2,7 @@ "id": "CVE-2013-5607", "sourceIdentifier": "security@mozilla.org", "published": "2013-11-20T14:12:50.697", - "lastModified": "2018-01-09T02:29:04.690", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -820,63 +820,63 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0:*:*:*:*:*:*:*", - "matchCriteriaId": "D9BBC7F8-D102-403F-8A88-AF279536E2F0" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0:*:*:*:*:*:*:*", + "matchCriteriaId": "3283FBAC-B77A-4C62-9D51-70BB35FA3D13" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "DFDAC701-5E69-4633-8CE4-04B8AFCC10C2" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "886D8A1F-ECDD-4FE9-A4E5-2322EEC0B880" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "83D5CFC4-C5DD-4747-985A-BC7A8E7C6EF7" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "E10B8803-C319-4AAA-81CF-FA206A33BA55" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.3:*:*:*:*:*:*:*", - "matchCriteriaId": "D5AFA78C-71F3-4E64-8A8F-5BA028F04037" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.3:*:*:*:*:*:*:*", + "matchCriteriaId": "E2B5567C-8969-456D-B6DF-3562B99C41FE" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.4:*:*:*:*:*:*:*", - "matchCriteriaId": "F99963C6-175B-4099-86F4-BADCA43DB41F" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.4:*:*:*:*:*:*:*", + "matchCriteriaId": "5657779C-19F9-42B8-BBBD-292B898E8FD2" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.5:*:*:*:*:*:*:*", - "matchCriteriaId": "96530DB0-8A9E-48FD-A5C5-28FD467568B2" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.5:*:*:*:*:*:*:*", + "matchCriteriaId": "EEA3B9F4-BD8E-488B-A362-0B86BC6DA275" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.6:*:*:*:*:*:*:*", - "matchCriteriaId": "9B0AC5E6-F4E3-41A9-A611-A0FAF11ABF68" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.6:*:*:*:*:*:*:*", + "matchCriteriaId": "6A91BD4A-76BD-40B9-9E12-22CACAAE42BF" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.7:*:*:*:*:*:*:*", - "matchCriteriaId": "832D5058-86F2-4FAA-A06D-AE1ED3A4C3B5" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.7:*:*:*:*:*:*:*", + "matchCriteriaId": "84CEB297-BEE9-4BBC-BA91-6AF14DCCA87C" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.8:*:*:*:*:*:*:*", - "matchCriteriaId": "772717C5-2A43-4064-9A21-C6A9B4F12CE9" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.8:*:*:*:*:*:*:*", + "matchCriteriaId": "C1890BA0-0BCD-4B24-805A-7580884CE5B3" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.9:*:*:*:*:*:*:*", - "matchCriteriaId": "B85ADCE5-3C9A-47C8-BB57-307A4813DD9A" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.9:*:*:*:*:*:*:*", + "matchCriteriaId": "4154D7D4-DAD7-46DB-A2A7-5A3702939865" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.10:*:*:*:*:*:*:*", - "matchCriteriaId": "BCC58392-18A6-4561-AA0B-9ED2A0775A29" + "criteria": "cpe:2.3:a:mozilla:firefox:17.0.10:*:*:*:*:*:*:*", + "matchCriteriaId": "D316A264-4651-4E8A-904F-447DBDB333D2" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:24.0:*:*:*:*:*:*:*", - "matchCriteriaId": "4142C9EE-7094-4CD5-A781-30B91AF28855" + "criteria": "cpe:2.3:a:mozilla:firefox:24.0:*:*:*:*:*:*:*", + "matchCriteriaId": "18E772D1-DD0F-4F04-8BB4-9550F3C601E1" }, { "vulnerable": true, diff --git a/CVE-2014/CVE-2014-15xx/CVE-2014-1533.json b/CVE-2014/CVE-2014-15xx/CVE-2014-1533.json index a3795e56939..88a07c028c1 100644 --- a/CVE-2014/CVE-2014-15xx/CVE-2014-1533.json +++ b/CVE-2014/CVE-2014-15xx/CVE-2014-1533.json @@ -2,7 +2,7 @@ "id": "CVE-2014-1533", "sourceIdentifier": "security@mozilla.org", "published": "2014-06-11T10:57:17.657", - "lastModified": "2017-12-28T02:29:00.537", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -63,8 +63,18 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:24.0:*:*:*:*:*:*:*", - "matchCriteriaId": "4142C9EE-7094-4CD5-A781-30B91AF28855" + "criteria": "cpe:2.3:a:mozilla:firefox:24.0:*:*:*:*:*:*:*", + "matchCriteriaId": "18E772D1-DD0F-4F04-8BB4-9550F3C601E1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:24.1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "050A0328-B07A-4CC7-B42E-A034F3140032" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:24.1.1:*:*:*:*:*:*:*", + "matchCriteriaId": "732CC40B-BCBA-436B-956F-52BE28D9B79B" }, { "vulnerable": true, @@ -76,16 +86,6 @@ "criteria": "cpe:2.3:a:mozilla:firefox_esr:24.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "70ECF11D-B5D0-4EBA-9E1F-0978AF7C7818" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:24.1.0:*:*:*:*:*:*:*", - "matchCriteriaId": "2E063254-A0BA-4804-8149-E9CA29CBA8F0" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:24.1.1:*:*:*:*:*:*:*", - "matchCriteriaId": "B252A215-308E-4B4C-9D7F-BA21A7D22CF4" - }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:24.2:*:*:*:*:*:*:*", diff --git a/CVE-2014/CVE-2014-15xx/CVE-2014-1538.json b/CVE-2014/CVE-2014-15xx/CVE-2014-1538.json index 4daf964c0ac..3bf0330f12b 100644 --- a/CVE-2014/CVE-2014-15xx/CVE-2014-1538.json +++ b/CVE-2014/CVE-2014-15xx/CVE-2014-1538.json @@ -2,7 +2,7 @@ "id": "CVE-2014-1538", "sourceIdentifier": "security@mozilla.org", "published": "2014-06-11T10:57:17.847", - "lastModified": "2017-12-28T02:29:00.910", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "evaluatorComment": "Per: http://cwe.mitre.org/data/definitions/416.html\n\n\"CWE-416: Use After Free\"", @@ -80,8 +80,18 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:24.0:*:*:*:*:*:*:*", - "matchCriteriaId": "4142C9EE-7094-4CD5-A781-30B91AF28855" + "criteria": "cpe:2.3:a:mozilla:firefox:24.0:*:*:*:*:*:*:*", + "matchCriteriaId": "18E772D1-DD0F-4F04-8BB4-9550F3C601E1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:24.1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "050A0328-B07A-4CC7-B42E-A034F3140032" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:24.1.1:*:*:*:*:*:*:*", + "matchCriteriaId": "732CC40B-BCBA-436B-956F-52BE28D9B79B" }, { "vulnerable": true, @@ -93,16 +103,6 @@ "criteria": "cpe:2.3:a:mozilla:firefox_esr:24.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "70ECF11D-B5D0-4EBA-9E1F-0978AF7C7818" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:24.1.0:*:*:*:*:*:*:*", - "matchCriteriaId": "2E063254-A0BA-4804-8149-E9CA29CBA8F0" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:24.1.1:*:*:*:*:*:*:*", - "matchCriteriaId": "B252A215-308E-4B4C-9D7F-BA21A7D22CF4" - }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:24.2:*:*:*:*:*:*:*", diff --git a/CVE-2014/CVE-2014-15xx/CVE-2014-1541.json b/CVE-2014/CVE-2014-15xx/CVE-2014-1541.json index 4abfc1d8479..9fc2d8fe03d 100644 --- a/CVE-2014/CVE-2014-15xx/CVE-2014-1541.json +++ b/CVE-2014/CVE-2014-15xx/CVE-2014-1541.json @@ -2,7 +2,7 @@ "id": "CVE-2014-1541", "sourceIdentifier": "security@mozilla.org", "published": "2014-06-11T10:57:17.987", - "lastModified": "2017-12-28T02:29:01.177", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "evaluatorComment": "Per http://cwe.mitre.org/data/definitions/416.html:\n\"CWE-416: Use After Free\"", @@ -131,8 +131,18 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:24.0:*:*:*:*:*:*:*", - "matchCriteriaId": "4142C9EE-7094-4CD5-A781-30B91AF28855" + "criteria": "cpe:2.3:a:mozilla:firefox:24.0:*:*:*:*:*:*:*", + "matchCriteriaId": "18E772D1-DD0F-4F04-8BB4-9550F3C601E1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:24.1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "050A0328-B07A-4CC7-B42E-A034F3140032" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:24.1.1:*:*:*:*:*:*:*", + "matchCriteriaId": "732CC40B-BCBA-436B-956F-52BE28D9B79B" }, { "vulnerable": true, @@ -144,16 +154,6 @@ "criteria": "cpe:2.3:a:mozilla:firefox_esr:24.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "70ECF11D-B5D0-4EBA-9E1F-0978AF7C7818" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:24.1.0:*:*:*:*:*:*:*", - "matchCriteriaId": "2E063254-A0BA-4804-8149-E9CA29CBA8F0" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:24.1.1:*:*:*:*:*:*:*", - "matchCriteriaId": "B252A215-308E-4B4C-9D7F-BA21A7D22CF4" - }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:24.2:*:*:*:*:*:*:*", diff --git a/CVE-2014/CVE-2014-15xx/CVE-2014-1544.json b/CVE-2014/CVE-2014-15xx/CVE-2014-1544.json index dcbc6361aca..f06f61903c0 100644 --- a/CVE-2014/CVE-2014-15xx/CVE-2014-1544.json +++ b/CVE-2014/CVE-2014-15xx/CVE-2014-1544.json @@ -2,7 +2,7 @@ "id": "CVE-2014-1544", "sourceIdentifier": "security@mozilla.org", "published": "2014-07-23T11:12:42.777", - "lastModified": "2017-01-07T02:59:38.673", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "evaluatorComment": "CWE-416: Use After Free", @@ -70,8 +70,18 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:24.0:*:*:*:*:*:*:*", - "matchCriteriaId": "4142C9EE-7094-4CD5-A781-30B91AF28855" + "criteria": "cpe:2.3:a:mozilla:firefox:24.0:*:*:*:*:*:*:*", + "matchCriteriaId": "18E772D1-DD0F-4F04-8BB4-9550F3C601E1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:24.1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "050A0328-B07A-4CC7-B42E-A034F3140032" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:24.1.1:*:*:*:*:*:*:*", + "matchCriteriaId": "732CC40B-BCBA-436B-956F-52BE28D9B79B" }, { "vulnerable": true, @@ -83,16 +93,6 @@ "criteria": "cpe:2.3:a:mozilla:firefox_esr:24.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "70ECF11D-B5D0-4EBA-9E1F-0978AF7C7818" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:24.1.0:*:*:*:*:*:*:*", - "matchCriteriaId": "2E063254-A0BA-4804-8149-E9CA29CBA8F0" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:24.1.1:*:*:*:*:*:*:*", - "matchCriteriaId": "B252A215-308E-4B4C-9D7F-BA21A7D22CF4" - }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:24.2:*:*:*:*:*:*:*", diff --git a/CVE-2014/CVE-2014-15xx/CVE-2014-1547.json b/CVE-2014/CVE-2014-15xx/CVE-2014-1547.json index 1350532bc8b..95229593dd7 100644 --- a/CVE-2014/CVE-2014-15xx/CVE-2014-1547.json +++ b/CVE-2014/CVE-2014-15xx/CVE-2014-1547.json @@ -2,7 +2,7 @@ "id": "CVE-2014-1547", "sourceIdentifier": "security@mozilla.org", "published": "2014-07-23T11:12:42.857", - "lastModified": "2017-01-07T02:59:38.860", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -69,8 +69,18 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:24.0:*:*:*:*:*:*:*", - "matchCriteriaId": "4142C9EE-7094-4CD5-A781-30B91AF28855" + "criteria": "cpe:2.3:a:mozilla:firefox:24.0:*:*:*:*:*:*:*", + "matchCriteriaId": "18E772D1-DD0F-4F04-8BB4-9550F3C601E1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:24.1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "050A0328-B07A-4CC7-B42E-A034F3140032" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:24.1.1:*:*:*:*:*:*:*", + "matchCriteriaId": "732CC40B-BCBA-436B-956F-52BE28D9B79B" }, { "vulnerable": true, @@ -82,16 +92,6 @@ "criteria": "cpe:2.3:a:mozilla:firefox_esr:24.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "70ECF11D-B5D0-4EBA-9E1F-0978AF7C7818" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:24.1.0:*:*:*:*:*:*:*", - "matchCriteriaId": "2E063254-A0BA-4804-8149-E9CA29CBA8F0" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:24.1.1:*:*:*:*:*:*:*", - "matchCriteriaId": "B252A215-308E-4B4C-9D7F-BA21A7D22CF4" - }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:24.2:*:*:*:*:*:*:*", diff --git a/CVE-2014/CVE-2014-15xx/CVE-2014-1551.json b/CVE-2014/CVE-2014-15xx/CVE-2014-1551.json index 23658860ee6..18613295e16 100644 --- a/CVE-2014/CVE-2014-15xx/CVE-2014-1551.json +++ b/CVE-2014/CVE-2014-15xx/CVE-2014-1551.json @@ -2,7 +2,7 @@ "id": "CVE-2014-1551", "sourceIdentifier": "security@mozilla.org", "published": "2014-07-23T11:12:43.043", - "lastModified": "2017-01-07T02:59:39.203", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "evaluatorComment": "CWE-416: Use After Free", @@ -71,8 +71,18 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:24.0:*:*:*:*:*:*:*", - "matchCriteriaId": "4142C9EE-7094-4CD5-A781-30B91AF28855" + "criteria": "cpe:2.3:a:mozilla:firefox:24.0:*:*:*:*:*:*:*", + "matchCriteriaId": "18E772D1-DD0F-4F04-8BB4-9550F3C601E1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:24.1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "050A0328-B07A-4CC7-B42E-A034F3140032" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:24.1.1:*:*:*:*:*:*:*", + "matchCriteriaId": "732CC40B-BCBA-436B-956F-52BE28D9B79B" }, { "vulnerable": true, @@ -84,16 +94,6 @@ "criteria": "cpe:2.3:a:mozilla:firefox_esr:24.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "70ECF11D-B5D0-4EBA-9E1F-0978AF7C7818" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:24.1.0:*:*:*:*:*:*:*", - "matchCriteriaId": "2E063254-A0BA-4804-8149-E9CA29CBA8F0" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:24.1.1:*:*:*:*:*:*:*", - "matchCriteriaId": "B252A215-308E-4B4C-9D7F-BA21A7D22CF4" - }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:24.2:*:*:*:*:*:*:*", diff --git a/CVE-2014/CVE-2014-15xx/CVE-2014-1553.json b/CVE-2014/CVE-2014-15xx/CVE-2014-1553.json index c4bdd9417ef..bf1a1a0dab1 100644 --- a/CVE-2014/CVE-2014-15xx/CVE-2014-1553.json +++ b/CVE-2014/CVE-2014-15xx/CVE-2014-1553.json @@ -2,7 +2,7 @@ "id": "CVE-2014-1553", "sourceIdentifier": "security@mozilla.org", "published": "2014-09-03T10:55:06.417", - "lastModified": "2018-10-30T16:27:34.687", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -106,11 +106,6 @@ "criteria": "cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*", "matchCriteriaId": "C11F024A-A8B7-405B-8A13-4BF406FBDB22" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.0:*:*:*:*:*:*:*", - "matchCriteriaId": "992DDB6B-F32C-4E80-B386-EB1643D079E4" - }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:thunderbird:31.0:*:*:*:*:*:*:*", diff --git a/CVE-2014/CVE-2014-15xx/CVE-2014-1555.json b/CVE-2014/CVE-2014-15xx/CVE-2014-1555.json index 3a16d57d25d..18230adeb2d 100644 --- a/CVE-2014/CVE-2014-15xx/CVE-2014-1555.json +++ b/CVE-2014/CVE-2014-15xx/CVE-2014-1555.json @@ -2,7 +2,7 @@ "id": "CVE-2014-1555", "sourceIdentifier": "security@mozilla.org", "published": "2014-07-23T11:12:43.137", - "lastModified": "2017-01-07T02:59:39.580", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "evaluatorComment": "CWE-416: Use After Free", @@ -70,8 +70,18 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:24.0:*:*:*:*:*:*:*", - "matchCriteriaId": "4142C9EE-7094-4CD5-A781-30B91AF28855" + "criteria": "cpe:2.3:a:mozilla:firefox:24.0:*:*:*:*:*:*:*", + "matchCriteriaId": "18E772D1-DD0F-4F04-8BB4-9550F3C601E1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:24.1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "050A0328-B07A-4CC7-B42E-A034F3140032" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:24.1.1:*:*:*:*:*:*:*", + "matchCriteriaId": "732CC40B-BCBA-436B-956F-52BE28D9B79B" }, { "vulnerable": true, @@ -83,16 +93,6 @@ "criteria": "cpe:2.3:a:mozilla:firefox_esr:24.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "70ECF11D-B5D0-4EBA-9E1F-0978AF7C7818" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:24.1.0:*:*:*:*:*:*:*", - "matchCriteriaId": "2E063254-A0BA-4804-8149-E9CA29CBA8F0" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:24.1.1:*:*:*:*:*:*:*", - "matchCriteriaId": "B252A215-308E-4B4C-9D7F-BA21A7D22CF4" - }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:24.2:*:*:*:*:*:*:*", diff --git a/CVE-2014/CVE-2014-15xx/CVE-2014-1556.json b/CVE-2014/CVE-2014-15xx/CVE-2014-1556.json index a0d10104b1a..495dfa1d355 100644 --- a/CVE-2014/CVE-2014-15xx/CVE-2014-1556.json +++ b/CVE-2014/CVE-2014-15xx/CVE-2014-1556.json @@ -2,7 +2,7 @@ "id": "CVE-2014-1556", "sourceIdentifier": "security@mozilla.org", "published": "2014-07-23T11:12:43.183", - "lastModified": "2017-01-07T02:59:39.687", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -69,8 +69,18 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:24.0:*:*:*:*:*:*:*", - "matchCriteriaId": "4142C9EE-7094-4CD5-A781-30B91AF28855" + "criteria": "cpe:2.3:a:mozilla:firefox:24.0:*:*:*:*:*:*:*", + "matchCriteriaId": "18E772D1-DD0F-4F04-8BB4-9550F3C601E1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:24.1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "050A0328-B07A-4CC7-B42E-A034F3140032" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:24.1.1:*:*:*:*:*:*:*", + "matchCriteriaId": "732CC40B-BCBA-436B-956F-52BE28D9B79B" }, { "vulnerable": true, @@ -82,16 +92,6 @@ "criteria": "cpe:2.3:a:mozilla:firefox_esr:24.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "70ECF11D-B5D0-4EBA-9E1F-0978AF7C7818" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:24.1.0:*:*:*:*:*:*:*", - "matchCriteriaId": "2E063254-A0BA-4804-8149-E9CA29CBA8F0" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:24.1.1:*:*:*:*:*:*:*", - "matchCriteriaId": "B252A215-308E-4B4C-9D7F-BA21A7D22CF4" - }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:24.2:*:*:*:*:*:*:*", diff --git a/CVE-2014/CVE-2014-15xx/CVE-2014-1557.json b/CVE-2014/CVE-2014-15xx/CVE-2014-1557.json index 97400cef5c3..ee8b793a286 100644 --- a/CVE-2014/CVE-2014-15xx/CVE-2014-1557.json +++ b/CVE-2014/CVE-2014-15xx/CVE-2014-1557.json @@ -2,7 +2,7 @@ "id": "CVE-2014-1557", "sourceIdentifier": "security@mozilla.org", "published": "2014-07-23T11:12:43.217", - "lastModified": "2017-01-07T02:59:39.797", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -84,8 +84,18 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:24.0:*:*:*:*:*:*:*", - "matchCriteriaId": "4142C9EE-7094-4CD5-A781-30B91AF28855" + "criteria": "cpe:2.3:a:mozilla:firefox:24.0:*:*:*:*:*:*:*", + "matchCriteriaId": "18E772D1-DD0F-4F04-8BB4-9550F3C601E1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:24.1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "050A0328-B07A-4CC7-B42E-A034F3140032" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:24.1.1:*:*:*:*:*:*:*", + "matchCriteriaId": "732CC40B-BCBA-436B-956F-52BE28D9B79B" }, { "vulnerable": true, @@ -97,16 +107,6 @@ "criteria": "cpe:2.3:a:mozilla:firefox_esr:24.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "70ECF11D-B5D0-4EBA-9E1F-0978AF7C7818" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:24.1.0:*:*:*:*:*:*:*", - "matchCriteriaId": "2E063254-A0BA-4804-8149-E9CA29CBA8F0" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:24.1.1:*:*:*:*:*:*:*", - "matchCriteriaId": "B252A215-308E-4B4C-9D7F-BA21A7D22CF4" - }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:24.2:*:*:*:*:*:*:*", diff --git a/CVE-2014/CVE-2014-15xx/CVE-2014-1562.json b/CVE-2014/CVE-2014-15xx/CVE-2014-1562.json index a69b847bdc7..7fe75540d5e 100644 --- a/CVE-2014/CVE-2014-15xx/CVE-2014-1562.json +++ b/CVE-2014/CVE-2014-15xx/CVE-2014-1562.json @@ -2,7 +2,7 @@ "id": "CVE-2014-1562", "sourceIdentifier": "security@mozilla.org", "published": "2014-09-03T10:55:06.557", - "lastModified": "2017-01-07T02:59:40.173", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -67,8 +67,23 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:24.0:*:*:*:*:*:*:*", - "matchCriteriaId": "4142C9EE-7094-4CD5-A781-30B91AF28855" + "criteria": "cpe:2.3:a:mozilla:firefox:24.0:*:*:*:*:*:*:*", + "matchCriteriaId": "18E772D1-DD0F-4F04-8BB4-9550F3C601E1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:24.1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "050A0328-B07A-4CC7-B42E-A034F3140032" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:24.1.1:*:*:*:*:*:*:*", + "matchCriteriaId": "732CC40B-BCBA-436B-956F-52BE28D9B79B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*", + "matchCriteriaId": "C11F024A-A8B7-405B-8A13-4BF406FBDB22" }, { "vulnerable": true, @@ -80,16 +95,6 @@ "criteria": "cpe:2.3:a:mozilla:firefox_esr:24.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "70ECF11D-B5D0-4EBA-9E1F-0978AF7C7818" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:24.1.0:*:*:*:*:*:*:*", - "matchCriteriaId": "2E063254-A0BA-4804-8149-E9CA29CBA8F0" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:24.1.1:*:*:*:*:*:*:*", - "matchCriteriaId": "B252A215-308E-4B4C-9D7F-BA21A7D22CF4" - }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:24.2:*:*:*:*:*:*:*", @@ -119,11 +124,6 @@ "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:24.7:*:*:*:*:*:*:*", "matchCriteriaId": "31A0674F-9FAA-4493-A7DD-BC084C4E1E6A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.0:*:*:*:*:*:*:*", - "matchCriteriaId": "992DDB6B-F32C-4E80-B386-EB1643D079E4" } ] } diff --git a/CVE-2014/CVE-2014-15xx/CVE-2014-1563.json b/CVE-2014/CVE-2014-15xx/CVE-2014-1563.json index 536d1054780..a9b66b9e991 100644 --- a/CVE-2014/CVE-2014-15xx/CVE-2014-1563.json +++ b/CVE-2014/CVE-2014-15xx/CVE-2014-1563.json @@ -2,7 +2,7 @@ "id": "CVE-2014-1563", "sourceIdentifier": "security@mozilla.org", "published": "2014-09-03T10:55:06.590", - "lastModified": "2018-10-30T16:27:34.687", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "evaluatorComment": "CWE-416: Use After Free", @@ -118,11 +118,6 @@ "criteria": "cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*", "matchCriteriaId": "C11F024A-A8B7-405B-8A13-4BF406FBDB22" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.0:*:*:*:*:*:*:*", - "matchCriteriaId": "992DDB6B-F32C-4E80-B386-EB1643D079E4" - }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:thunderbird:31.0:*:*:*:*:*:*:*", diff --git a/CVE-2014/CVE-2014-15xx/CVE-2014-1564.json b/CVE-2014/CVE-2014-15xx/CVE-2014-1564.json index 167a6e18cf2..e3e1faa312c 100644 --- a/CVE-2014/CVE-2014-15xx/CVE-2014-1564.json +++ b/CVE-2014/CVE-2014-15xx/CVE-2014-1564.json @@ -2,7 +2,7 @@ "id": "CVE-2014-1564", "sourceIdentifier": "security@mozilla.org", "published": "2014-09-03T10:55:06.637", - "lastModified": "2018-10-30T16:27:34.687", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "evaluatorComment": "CWE-824: Access of Uninitialized Pointer", @@ -103,11 +103,6 @@ "criteria": "cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*", "matchCriteriaId": "C11F024A-A8B7-405B-8A13-4BF406FBDB22" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.0:*:*:*:*:*:*:*", - "matchCriteriaId": "992DDB6B-F32C-4E80-B386-EB1643D079E4" - }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:thunderbird:31.0:*:*:*:*:*:*:*", diff --git a/CVE-2014/CVE-2014-15xx/CVE-2014-1565.json b/CVE-2014/CVE-2014-15xx/CVE-2014-1565.json index bf283c5e3a8..2407aa51323 100644 --- a/CVE-2014/CVE-2014-15xx/CVE-2014-1565.json +++ b/CVE-2014/CVE-2014-15xx/CVE-2014-1565.json @@ -2,7 +2,7 @@ "id": "CVE-2014-1565", "sourceIdentifier": "security@mozilla.org", "published": "2014-09-03T10:55:06.667", - "lastModified": "2017-01-07T02:59:40.687", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -77,11 +77,6 @@ "criteria": "cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*", "matchCriteriaId": "C11F024A-A8B7-405B-8A13-4BF406FBDB22" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.0:*:*:*:*:*:*:*", - "matchCriteriaId": "992DDB6B-F32C-4E80-B386-EB1643D079E4" - }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:thunderbird:31.0:*:*:*:*:*:*:*", diff --git a/CVE-2014/CVE-2014-15xx/CVE-2014-1567.json b/CVE-2014/CVE-2014-15xx/CVE-2014-1567.json index 56d3b36dba8..ad39aff02d6 100644 --- a/CVE-2014/CVE-2014-15xx/CVE-2014-1567.json +++ b/CVE-2014/CVE-2014-15xx/CVE-2014-1567.json @@ -2,7 +2,7 @@ "id": "CVE-2014-1567", "sourceIdentifier": "security@mozilla.org", "published": "2014-09-03T10:55:06.760", - "lastModified": "2017-01-07T02:59:40.860", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "evaluatorComment": "CWE-416: Use After Free", @@ -90,8 +90,23 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:24.0:*:*:*:*:*:*:*", - "matchCriteriaId": "4142C9EE-7094-4CD5-A781-30B91AF28855" + "criteria": "cpe:2.3:a:mozilla:firefox:24.0:*:*:*:*:*:*:*", + "matchCriteriaId": "18E772D1-DD0F-4F04-8BB4-9550F3C601E1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:24.1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "050A0328-B07A-4CC7-B42E-A034F3140032" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:24.1.1:*:*:*:*:*:*:*", + "matchCriteriaId": "732CC40B-BCBA-436B-956F-52BE28D9B79B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*", + "matchCriteriaId": "C11F024A-A8B7-405B-8A13-4BF406FBDB22" }, { "vulnerable": true, @@ -103,16 +118,6 @@ "criteria": "cpe:2.3:a:mozilla:firefox_esr:24.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "70ECF11D-B5D0-4EBA-9E1F-0978AF7C7818" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:24.1.0:*:*:*:*:*:*:*", - "matchCriteriaId": "2E063254-A0BA-4804-8149-E9CA29CBA8F0" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:24.1.1:*:*:*:*:*:*:*", - "matchCriteriaId": "B252A215-308E-4B4C-9D7F-BA21A7D22CF4" - }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:24.2:*:*:*:*:*:*:*", @@ -142,11 +147,6 @@ "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:24.7:*:*:*:*:*:*:*", "matchCriteriaId": "31A0674F-9FAA-4493-A7DD-BC084C4E1E6A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.0:*:*:*:*:*:*:*", - "matchCriteriaId": "992DDB6B-F32C-4E80-B386-EB1643D079E4" } ] } diff --git a/CVE-2014/CVE-2014-15xx/CVE-2014-1568.json b/CVE-2014/CVE-2014-15xx/CVE-2014-1568.json index 1ba619b7819..ff867e0a086 100644 --- a/CVE-2014/CVE-2014-15xx/CVE-2014-1568.json +++ b/CVE-2014/CVE-2014-15xx/CVE-2014-1568.json @@ -2,7 +2,7 @@ "id": "CVE-2014-1568", "sourceIdentifier": "security@mozilla.org", "published": "2014-09-25T17:55:04.387", - "lastModified": "2017-08-29T01:34:25.843", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -100,6 +100,16 @@ "versionEndIncluding": "32.0", "matchCriteriaId": "97A0B769-5287-4E95-874B-F1D7FC41C7AF" }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*", + "matchCriteriaId": "C11F024A-A8B7-405B-8A13-4BF406FBDB22" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "D81A3698-797C-4CD9-BB02-A9182E0A6E11" + }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox:32.0.1:*:*:*:*:*:*:*", @@ -115,16 +125,6 @@ "criteria": "cpe:2.3:a:mozilla:firefox_esr:24.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "94159B22-C2F9-4FCF-B86E-681441FEB015" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.0:*:*:*:*:*:*:*", - "matchCriteriaId": "992DDB6B-F32C-4E80-B386-EB1643D079E4" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.1.0:*:*:*:*:*:*:*", - "matchCriteriaId": "19837144-FBCC-4B36-BAF4-FCD9F9C2AAE5" - }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:*", diff --git a/CVE-2014/CVE-2014-15xx/CVE-2014-1574.json b/CVE-2014/CVE-2014-15xx/CVE-2014-1574.json index 9e80b9ee583..c73e5e1ba4c 100644 --- a/CVE-2014/CVE-2014-15xx/CVE-2014-1574.json +++ b/CVE-2014/CVE-2014-15xx/CVE-2014-1574.json @@ -2,7 +2,7 @@ "id": "CVE-2014-1574", "sourceIdentifier": "security@mozilla.org", "published": "2014-10-15T10:55:06.567", - "lastModified": "2016-12-24T02:59:01.197", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -82,16 +82,6 @@ "criteria": "cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "D81A3698-797C-4CD9-BB02-A9182E0A6E11" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.0:*:*:*:*:*:*:*", - "matchCriteriaId": "992DDB6B-F32C-4E80-B386-EB1643D079E4" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.1.0:*:*:*:*:*:*:*", - "matchCriteriaId": "19837144-FBCC-4B36-BAF4-FCD9F9C2AAE5" - }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:thunderbird:31.0:*:*:*:*:*:*:*", diff --git a/CVE-2014/CVE-2014-15xx/CVE-2014-1576.json b/CVE-2014/CVE-2014-15xx/CVE-2014-1576.json index 1fb3728d4f7..a24f1f83515 100644 --- a/CVE-2014/CVE-2014-15xx/CVE-2014-1576.json +++ b/CVE-2014/CVE-2014-15xx/CVE-2014-1576.json @@ -2,7 +2,7 @@ "id": "CVE-2014-1576", "sourceIdentifier": "security@mozilla.org", "published": "2014-10-15T10:55:06.677", - "lastModified": "2016-12-24T02:59:01.290", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -83,13 +83,13 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.0:*:*:*:*:*:*:*", - "matchCriteriaId": "992DDB6B-F32C-4E80-B386-EB1643D079E4" + "criteria": "cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*", + "matchCriteriaId": "C11F024A-A8B7-405B-8A13-4BF406FBDB22" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.1.0:*:*:*:*:*:*:*", - "matchCriteriaId": "19837144-FBCC-4B36-BAF4-FCD9F9C2AAE5" + "criteria": "cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "D81A3698-797C-4CD9-BB02-A9182E0A6E11" } ] } diff --git a/CVE-2014/CVE-2014-15xx/CVE-2014-1577.json b/CVE-2014/CVE-2014-15xx/CVE-2014-1577.json index a27ac7bd219..b911f1e156b 100644 --- a/CVE-2014/CVE-2014-15xx/CVE-2014-1577.json +++ b/CVE-2014/CVE-2014-15xx/CVE-2014-1577.json @@ -2,7 +2,7 @@ "id": "CVE-2014-1577", "sourceIdentifier": "security@mozilla.org", "published": "2014-10-15T10:55:06.723", - "lastModified": "2016-12-24T02:59:01.367", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -63,13 +63,13 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.0:*:*:*:*:*:*:*", - "matchCriteriaId": "992DDB6B-F32C-4E80-B386-EB1643D079E4" + "criteria": "cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*", + "matchCriteriaId": "C11F024A-A8B7-405B-8A13-4BF406FBDB22" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.1.0:*:*:*:*:*:*:*", - "matchCriteriaId": "19837144-FBCC-4B36-BAF4-FCD9F9C2AAE5" + "criteria": "cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "D81A3698-797C-4CD9-BB02-A9182E0A6E11" } ] } diff --git a/CVE-2014/CVE-2014-15xx/CVE-2014-1578.json b/CVE-2014/CVE-2014-15xx/CVE-2014-1578.json index af22c6ea925..67d7979485e 100644 --- a/CVE-2014/CVE-2014-15xx/CVE-2014-1578.json +++ b/CVE-2014/CVE-2014-15xx/CVE-2014-1578.json @@ -2,7 +2,7 @@ "id": "CVE-2014-1578", "sourceIdentifier": "security@mozilla.org", "published": "2014-10-15T10:55:06.770", - "lastModified": "2016-12-24T02:59:01.460", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -63,13 +63,13 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.0:*:*:*:*:*:*:*", - "matchCriteriaId": "992DDB6B-F32C-4E80-B386-EB1643D079E4" + "criteria": "cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*", + "matchCriteriaId": "C11F024A-A8B7-405B-8A13-4BF406FBDB22" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.1.0:*:*:*:*:*:*:*", - "matchCriteriaId": "19837144-FBCC-4B36-BAF4-FCD9F9C2AAE5" + "criteria": "cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "D81A3698-797C-4CD9-BB02-A9182E0A6E11" } ] } diff --git a/CVE-2014/CVE-2014-15xx/CVE-2014-1581.json b/CVE-2014/CVE-2014-15xx/CVE-2014-1581.json index e629e6ff636..8ddf6a2767e 100644 --- a/CVE-2014/CVE-2014-15xx/CVE-2014-1581.json +++ b/CVE-2014/CVE-2014-15xx/CVE-2014-1581.json @@ -2,7 +2,7 @@ "id": "CVE-2014-1581", "sourceIdentifier": "security@mozilla.org", "published": "2014-10-15T10:55:06.847", - "lastModified": "2016-12-24T02:59:01.540", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "evaluatorComment": "CWE-416: Use After Free", @@ -84,13 +84,13 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.0:*:*:*:*:*:*:*", - "matchCriteriaId": "992DDB6B-F32C-4E80-B386-EB1643D079E4" + "criteria": "cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*", + "matchCriteriaId": "C11F024A-A8B7-405B-8A13-4BF406FBDB22" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.1.0:*:*:*:*:*:*:*", - "matchCriteriaId": "19837144-FBCC-4B36-BAF4-FCD9F9C2AAE5" + "criteria": "cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "D81A3698-797C-4CD9-BB02-A9182E0A6E11" } ] } diff --git a/CVE-2014/CVE-2014-15xx/CVE-2014-1583.json b/CVE-2014/CVE-2014-15xx/CVE-2014-1583.json index 409bb44c9a8..78ec482b1e6 100644 --- a/CVE-2014/CVE-2014-15xx/CVE-2014-1583.json +++ b/CVE-2014/CVE-2014-15xx/CVE-2014-1583.json @@ -2,7 +2,7 @@ "id": "CVE-2014-1583", "sourceIdentifier": "security@mozilla.org", "published": "2014-10-15T10:55:06.943", - "lastModified": "2016-12-22T02:59:14.017", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -94,13 +94,13 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.0:*:*:*:*:*:*:*", - "matchCriteriaId": "992DDB6B-F32C-4E80-B386-EB1643D079E4" + "criteria": "cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*", + "matchCriteriaId": "C11F024A-A8B7-405B-8A13-4BF406FBDB22" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.1.0:*:*:*:*:*:*:*", - "matchCriteriaId": "19837144-FBCC-4B36-BAF4-FCD9F9C2AAE5" + "criteria": "cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "D81A3698-797C-4CD9-BB02-A9182E0A6E11" } ] } diff --git a/CVE-2014/CVE-2014-15xx/CVE-2014-1585.json b/CVE-2014/CVE-2014-15xx/CVE-2014-1585.json index 753ac75104d..c12952e23c7 100644 --- a/CVE-2014/CVE-2014-15xx/CVE-2014-1585.json +++ b/CVE-2014/CVE-2014-15xx/CVE-2014-1585.json @@ -2,7 +2,7 @@ "id": "CVE-2014-1585", "sourceIdentifier": "security@mozilla.org", "published": "2014-10-15T10:55:07.037", - "lastModified": "2016-12-24T02:59:01.633", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -83,13 +83,13 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.0:*:*:*:*:*:*:*", - "matchCriteriaId": "992DDB6B-F32C-4E80-B386-EB1643D079E4" + "criteria": "cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*", + "matchCriteriaId": "C11F024A-A8B7-405B-8A13-4BF406FBDB22" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.1.0:*:*:*:*:*:*:*", - "matchCriteriaId": "19837144-FBCC-4B36-BAF4-FCD9F9C2AAE5" + "criteria": "cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "D81A3698-797C-4CD9-BB02-A9182E0A6E11" } ] } diff --git a/CVE-2014/CVE-2014-15xx/CVE-2014-1586.json b/CVE-2014/CVE-2014-15xx/CVE-2014-1586.json index 5f831864622..f16eebc887b 100644 --- a/CVE-2014/CVE-2014-15xx/CVE-2014-1586.json +++ b/CVE-2014/CVE-2014-15xx/CVE-2014-1586.json @@ -2,7 +2,7 @@ "id": "CVE-2014-1586", "sourceIdentifier": "security@mozilla.org", "published": "2014-10-15T10:55:07.083", - "lastModified": "2016-12-24T02:59:01.710", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -114,13 +114,13 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.0:*:*:*:*:*:*:*", - "matchCriteriaId": "992DDB6B-F32C-4E80-B386-EB1643D079E4" + "criteria": "cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*", + "matchCriteriaId": "C11F024A-A8B7-405B-8A13-4BF406FBDB22" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.1.0:*:*:*:*:*:*:*", - "matchCriteriaId": "19837144-FBCC-4B36-BAF4-FCD9F9C2AAE5" + "criteria": "cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "D81A3698-797C-4CD9-BB02-A9182E0A6E11" } ] } diff --git a/CVE-2014/CVE-2014-15xx/CVE-2014-1595.json b/CVE-2014/CVE-2014-15xx/CVE-2014-1595.json index 6bcc5d9d8c6..d9e35ff8264 100644 --- a/CVE-2014/CVE-2014-15xx/CVE-2014-1595.json +++ b/CVE-2014/CVE-2014-15xx/CVE-2014-1595.json @@ -2,7 +2,7 @@ "id": "CVE-2014-1595", "sourceIdentifier": "security@mozilla.org", "published": "2014-12-11T11:59:09.243", - "lastModified": "2016-10-04T02:01:14.747", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -64,18 +64,18 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.0:*:*:*:*:*:*:*", - "matchCriteriaId": "992DDB6B-F32C-4E80-B386-EB1643D079E4" + "criteria": "cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*", + "matchCriteriaId": "C11F024A-A8B7-405B-8A13-4BF406FBDB22" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.1.0:*:*:*:*:*:*:*", - "matchCriteriaId": "19837144-FBCC-4B36-BAF4-FCD9F9C2AAE5" + "criteria": "cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "D81A3698-797C-4CD9-BB02-A9182E0A6E11" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.1.1:*:*:*:*:*:*:*", - "matchCriteriaId": "D0DB1BAA-3729-48BD-A8D0-5BBF3D4ABDE6" + "criteria": "cpe:2.3:a:mozilla:firefox:31.1.1:*:*:*:*:*:*:*", + "matchCriteriaId": "84E8D7C7-B578-4623-9EA2-D13965DBE1F3" }, { "vulnerable": true, diff --git a/CVE-2014/CVE-2014-86xx/CVE-2014-8634.json b/CVE-2014/CVE-2014-86xx/CVE-2014-8634.json index d3d3accc2ce..49972479541 100644 --- a/CVE-2014/CVE-2014-86xx/CVE-2014-8634.json +++ b/CVE-2014/CVE-2014-86xx/CVE-2014-8634.json @@ -2,7 +2,7 @@ "id": "CVE-2014-8634", "sourceIdentifier": "security@mozilla.org", "published": "2015-01-14T11:59:03.397", - "lastModified": "2017-09-08T01:29:25.933", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -63,28 +63,28 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.0:*:*:*:*:*:*:*", - "matchCriteriaId": "992DDB6B-F32C-4E80-B386-EB1643D079E4" + "criteria": "cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*", + "matchCriteriaId": "C11F024A-A8B7-405B-8A13-4BF406FBDB22" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.1.0:*:*:*:*:*:*:*", - "matchCriteriaId": "19837144-FBCC-4B36-BAF4-FCD9F9C2AAE5" + "criteria": "cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "D81A3698-797C-4CD9-BB02-A9182E0A6E11" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.1.1:*:*:*:*:*:*:*", - "matchCriteriaId": "D0DB1BAA-3729-48BD-A8D0-5BBF3D4ABDE6" + "criteria": "cpe:2.3:a:mozilla:firefox:31.1.1:*:*:*:*:*:*:*", + "matchCriteriaId": "84E8D7C7-B578-4623-9EA2-D13965DBE1F3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:31.3.0:*:*:*:*:*:*:*", + "matchCriteriaId": "C3E5D043-71F8-4A61-BEA4-176153E26FD6" }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.2:*:*:*:*:*:*:*", "matchCriteriaId": "7DCA6959-24B7-4F86-BE25-0A8A7C1A3D13" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.3.0:*:*:*:*:*:*:*", - "matchCriteriaId": "5C699284-7876-4C8D-B259-B97C60C9A349" } ] } diff --git a/CVE-2014/CVE-2014-86xx/CVE-2014-8638.json b/CVE-2014/CVE-2014-86xx/CVE-2014-8638.json index 8f4c11a4a8f..b8dea3469ac 100644 --- a/CVE-2014/CVE-2014-86xx/CVE-2014-8638.json +++ b/CVE-2014/CVE-2014-86xx/CVE-2014-8638.json @@ -2,7 +2,7 @@ "id": "CVE-2014-8638", "sourceIdentifier": "security@mozilla.org", "published": "2015-01-14T11:59:07.163", - "lastModified": "2017-09-08T01:29:26.153", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -63,28 +63,28 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.0:*:*:*:*:*:*:*", - "matchCriteriaId": "992DDB6B-F32C-4E80-B386-EB1643D079E4" + "criteria": "cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*", + "matchCriteriaId": "C11F024A-A8B7-405B-8A13-4BF406FBDB22" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.1.0:*:*:*:*:*:*:*", - "matchCriteriaId": "19837144-FBCC-4B36-BAF4-FCD9F9C2AAE5" + "criteria": "cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "D81A3698-797C-4CD9-BB02-A9182E0A6E11" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.1.1:*:*:*:*:*:*:*", - "matchCriteriaId": "D0DB1BAA-3729-48BD-A8D0-5BBF3D4ABDE6" + "criteria": "cpe:2.3:a:mozilla:firefox:31.1.1:*:*:*:*:*:*:*", + "matchCriteriaId": "84E8D7C7-B578-4623-9EA2-D13965DBE1F3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:31.3.0:*:*:*:*:*:*:*", + "matchCriteriaId": "C3E5D043-71F8-4A61-BEA4-176153E26FD6" }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.2:*:*:*:*:*:*:*", "matchCriteriaId": "7DCA6959-24B7-4F86-BE25-0A8A7C1A3D13" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.3.0:*:*:*:*:*:*:*", - "matchCriteriaId": "5C699284-7876-4C8D-B259-B97C60C9A349" } ] } diff --git a/CVE-2014/CVE-2014-86xx/CVE-2014-8639.json b/CVE-2014/CVE-2014-86xx/CVE-2014-8639.json index 30a12b9afce..b63daafbfdb 100644 --- a/CVE-2014/CVE-2014-86xx/CVE-2014-8639.json +++ b/CVE-2014/CVE-2014-86xx/CVE-2014-8639.json @@ -2,7 +2,7 @@ "id": "CVE-2014-8639", "sourceIdentifier": "security@mozilla.org", "published": "2015-01-14T11:59:07.930", - "lastModified": "2017-09-08T01:29:26.247", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "evaluatorComment": "CWE-384: Session Fixation", @@ -96,28 +96,28 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.0:*:*:*:*:*:*:*", - "matchCriteriaId": "992DDB6B-F32C-4E80-B386-EB1643D079E4" + "criteria": "cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*", + "matchCriteriaId": "C11F024A-A8B7-405B-8A13-4BF406FBDB22" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.1.0:*:*:*:*:*:*:*", - "matchCriteriaId": "19837144-FBCC-4B36-BAF4-FCD9F9C2AAE5" + "criteria": "cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "D81A3698-797C-4CD9-BB02-A9182E0A6E11" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.1.1:*:*:*:*:*:*:*", - "matchCriteriaId": "D0DB1BAA-3729-48BD-A8D0-5BBF3D4ABDE6" + "criteria": "cpe:2.3:a:mozilla:firefox:31.1.1:*:*:*:*:*:*:*", + "matchCriteriaId": "84E8D7C7-B578-4623-9EA2-D13965DBE1F3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:31.3.0:*:*:*:*:*:*:*", + "matchCriteriaId": "C3E5D043-71F8-4A61-BEA4-176153E26FD6" }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.2:*:*:*:*:*:*:*", "matchCriteriaId": "7DCA6959-24B7-4F86-BE25-0A8A7C1A3D13" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.3.0:*:*:*:*:*:*:*", - "matchCriteriaId": "5C699284-7876-4C8D-B259-B97C60C9A349" } ] } diff --git a/CVE-2014/CVE-2014-86xx/CVE-2014-8641.json b/CVE-2014/CVE-2014-86xx/CVE-2014-8641.json index d680aec9f67..33d30eaa5f4 100644 --- a/CVE-2014/CVE-2014-86xx/CVE-2014-8641.json +++ b/CVE-2014/CVE-2014-86xx/CVE-2014-8641.json @@ -2,7 +2,7 @@ "id": "CVE-2014-8641", "sourceIdentifier": "security@mozilla.org", "published": "2015-01-14T11:59:09.727", - "lastModified": "2017-09-08T01:29:26.387", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "evaluatorComment": "CWE-416: Use After Free", @@ -80,28 +80,28 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.0:*:*:*:*:*:*:*", - "matchCriteriaId": "992DDB6B-F32C-4E80-B386-EB1643D079E4" + "criteria": "cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*", + "matchCriteriaId": "C11F024A-A8B7-405B-8A13-4BF406FBDB22" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.1.0:*:*:*:*:*:*:*", - "matchCriteriaId": "19837144-FBCC-4B36-BAF4-FCD9F9C2AAE5" + "criteria": "cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "D81A3698-797C-4CD9-BB02-A9182E0A6E11" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.1.1:*:*:*:*:*:*:*", - "matchCriteriaId": "D0DB1BAA-3729-48BD-A8D0-5BBF3D4ABDE6" + "criteria": "cpe:2.3:a:mozilla:firefox:31.1.1:*:*:*:*:*:*:*", + "matchCriteriaId": "84E8D7C7-B578-4623-9EA2-D13965DBE1F3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:31.3.0:*:*:*:*:*:*:*", + "matchCriteriaId": "C3E5D043-71F8-4A61-BEA4-176153E26FD6" }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.2:*:*:*:*:*:*:*", "matchCriteriaId": "7DCA6959-24B7-4F86-BE25-0A8A7C1A3D13" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.3.0:*:*:*:*:*:*:*", - "matchCriteriaId": "5C699284-7876-4C8D-B259-B97C60C9A349" } ] } diff --git a/CVE-2015/CVE-2015-08xx/CVE-2015-0801.json b/CVE-2015/CVE-2015-08xx/CVE-2015-0801.json index c31cd928543..fb709ac8131 100644 --- a/CVE-2015/CVE-2015-08xx/CVE-2015-0801.json +++ b/CVE-2015/CVE-2015-08xx/CVE-2015-0801.json @@ -2,7 +2,7 @@ "id": "CVE-2015-0801", "sourceIdentifier": "security@mozilla.org", "published": "2015-04-01T10:59:02.643", - "lastModified": "2017-01-03T02:59:43.177", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -67,32 +67,42 @@ "versionEndIncluding": "36.0.4", "matchCriteriaId": "4E600CCE-7BA3-410C-B089-9C7C27EE7D82" }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*", + "matchCriteriaId": "C11F024A-A8B7-405B-8A13-4BF406FBDB22" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "D81A3698-797C-4CD9-BB02-A9182E0A6E11" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:31.1.1:*:*:*:*:*:*:*", + "matchCriteriaId": "84E8D7C7-B578-4623-9EA2-D13965DBE1F3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:31.3.0:*:*:*:*:*:*:*", + "matchCriteriaId": "C3E5D043-71F8-4A61-BEA4-176153E26FD6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:31.5.2:*:*:*:*:*:*:*", + "matchCriteriaId": "902BF23B-C1B9-41F2-BF5D-C1722C3DBFFD" + }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", "versionEndIncluding": "31.5.3", "matchCriteriaId": "FDEF9754-B549-4AAC-926B-404143EA27FF" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.0:*:*:*:*:*:*:*", - "matchCriteriaId": "992DDB6B-F32C-4E80-B386-EB1643D079E4" - }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.1:*:*:*:*:*:*:*", "matchCriteriaId": "6D7AAC77-57A3-4747-B760-0EE3CD53E4DE" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.1.0:*:*:*:*:*:*:*", - "matchCriteriaId": "19837144-FBCC-4B36-BAF4-FCD9F9C2AAE5" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.1.1:*:*:*:*:*:*:*", - "matchCriteriaId": "D0DB1BAA-3729-48BD-A8D0-5BBF3D4ABDE6" - }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.2:*:*:*:*:*:*:*", @@ -103,11 +113,6 @@ "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.3:*:*:*:*:*:*:*", "matchCriteriaId": "697EA344-F982-4E9F-9EC8-CCCB5829582B" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.3.0:*:*:*:*:*:*:*", - "matchCriteriaId": "5C699284-7876-4C8D-B259-B97C60C9A349" - }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.4:*:*:*:*:*:*:*", @@ -123,11 +128,6 @@ "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "4C9244A7-665A-48DE-89C9-C76E7A4556F5" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.5.2:*:*:*:*:*:*:*", - "matchCriteriaId": "2E6787E1-0523-49B7-B9B3-74F2D43DB714" - }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", diff --git a/CVE-2015/CVE-2015-08xx/CVE-2015-0807.json b/CVE-2015/CVE-2015-08xx/CVE-2015-0807.json index 262e853149c..522432c631a 100644 --- a/CVE-2015/CVE-2015-08xx/CVE-2015-0807.json +++ b/CVE-2015/CVE-2015-08xx/CVE-2015-0807.json @@ -2,7 +2,7 @@ "id": "CVE-2015-0807", "sourceIdentifier": "security@mozilla.org", "published": "2015-04-01T10:59:08.147", - "lastModified": "2017-01-03T02:59:43.270", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -69,24 +69,39 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.0:*:*:*:*:*:*:*", - "matchCriteriaId": "992DDB6B-F32C-4E80-B386-EB1643D079E4" + "criteria": "cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*", + "matchCriteriaId": "C11F024A-A8B7-405B-8A13-4BF406FBDB22" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "D81A3698-797C-4CD9-BB02-A9182E0A6E11" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:31.1.1:*:*:*:*:*:*:*", + "matchCriteriaId": "84E8D7C7-B578-4623-9EA2-D13965DBE1F3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:31.3.0:*:*:*:*:*:*:*", + "matchCriteriaId": "C3E5D043-71F8-4A61-BEA4-176153E26FD6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:31.5.2:*:*:*:*:*:*:*", + "matchCriteriaId": "902BF23B-C1B9-41F2-BF5D-C1722C3DBFFD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:31.5.3:*:*:*:*:*:*:*", + "matchCriteriaId": "60521E93-3495-40F7-AA72-EE531F8FA09D" }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.1:*:*:*:*:*:*:*", "matchCriteriaId": "6D7AAC77-57A3-4747-B760-0EE3CD53E4DE" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.1.0:*:*:*:*:*:*:*", - "matchCriteriaId": "19837144-FBCC-4B36-BAF4-FCD9F9C2AAE5" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.1.1:*:*:*:*:*:*:*", - "matchCriteriaId": "D0DB1BAA-3729-48BD-A8D0-5BBF3D4ABDE6" - }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.2:*:*:*:*:*:*:*", @@ -97,11 +112,6 @@ "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.3:*:*:*:*:*:*:*", "matchCriteriaId": "697EA344-F982-4E9F-9EC8-CCCB5829582B" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.3.0:*:*:*:*:*:*:*", - "matchCriteriaId": "5C699284-7876-4C8D-B259-B97C60C9A349" - }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.4:*:*:*:*:*:*:*", @@ -117,16 +127,6 @@ "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "4C9244A7-665A-48DE-89C9-C76E7A4556F5" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.5.2:*:*:*:*:*:*:*", - "matchCriteriaId": "2E6787E1-0523-49B7-B9B3-74F2D43DB714" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.5.3:*:*:*:*:*:*:*", - "matchCriteriaId": "AA842900-6ABD-4493-A5FF-C8840B081190" - }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", diff --git a/CVE-2015/CVE-2015-08xx/CVE-2015-0817.json b/CVE-2015/CVE-2015-08xx/CVE-2015-0817.json index f7805c2eec9..28215217b00 100644 --- a/CVE-2015/CVE-2015-08xx/CVE-2015-0817.json +++ b/CVE-2015/CVE-2015-08xx/CVE-2015-0817.json @@ -2,7 +2,7 @@ "id": "CVE-2015-0817", "sourceIdentifier": "security@mozilla.org", "published": "2015-03-24T00:59:05.843", - "lastModified": "2017-01-03T02:59:43.567", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -69,24 +69,29 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.0:*:*:*:*:*:*:*", - "matchCriteriaId": "992DDB6B-F32C-4E80-B386-EB1643D079E4" + "criteria": "cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*", + "matchCriteriaId": "C11F024A-A8B7-405B-8A13-4BF406FBDB22" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "D81A3698-797C-4CD9-BB02-A9182E0A6E11" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:31.1.1:*:*:*:*:*:*:*", + "matchCriteriaId": "84E8D7C7-B578-4623-9EA2-D13965DBE1F3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:31.3.0:*:*:*:*:*:*:*", + "matchCriteriaId": "C3E5D043-71F8-4A61-BEA4-176153E26FD6" }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.1:*:*:*:*:*:*:*", "matchCriteriaId": "6D7AAC77-57A3-4747-B760-0EE3CD53E4DE" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.1.0:*:*:*:*:*:*:*", - "matchCriteriaId": "19837144-FBCC-4B36-BAF4-FCD9F9C2AAE5" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.1.1:*:*:*:*:*:*:*", - "matchCriteriaId": "D0DB1BAA-3729-48BD-A8D0-5BBF3D4ABDE6" - }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.2:*:*:*:*:*:*:*", @@ -97,11 +102,6 @@ "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.3:*:*:*:*:*:*:*", "matchCriteriaId": "697EA344-F982-4E9F-9EC8-CCCB5829582B" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.3.0:*:*:*:*:*:*:*", - "matchCriteriaId": "5C699284-7876-4C8D-B259-B97C60C9A349" - }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.4:*:*:*:*:*:*:*", diff --git a/CVE-2015/CVE-2015-08xx/CVE-2015-0818.json b/CVE-2015/CVE-2015-08xx/CVE-2015-0818.json index f3b67d65976..086cba77d56 100644 --- a/CVE-2015/CVE-2015-08xx/CVE-2015-0818.json +++ b/CVE-2015/CVE-2015-08xx/CVE-2015-0818.json @@ -2,7 +2,7 @@ "id": "CVE-2015-0818", "sourceIdentifier": "security@mozilla.org", "published": "2015-03-24T00:59:07.250", - "lastModified": "2016-12-22T02:59:27.597", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -69,24 +69,34 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.0:*:*:*:*:*:*:*", - "matchCriteriaId": "992DDB6B-F32C-4E80-B386-EB1643D079E4" + "criteria": "cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*", + "matchCriteriaId": "C11F024A-A8B7-405B-8A13-4BF406FBDB22" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "D81A3698-797C-4CD9-BB02-A9182E0A6E11" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:31.1.1:*:*:*:*:*:*:*", + "matchCriteriaId": "84E8D7C7-B578-4623-9EA2-D13965DBE1F3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:31.3.0:*:*:*:*:*:*:*", + "matchCriteriaId": "C3E5D043-71F8-4A61-BEA4-176153E26FD6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:31.5.2:*:*:*:*:*:*:*", + "matchCriteriaId": "902BF23B-C1B9-41F2-BF5D-C1722C3DBFFD" }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.1:*:*:*:*:*:*:*", "matchCriteriaId": "6D7AAC77-57A3-4747-B760-0EE3CD53E4DE" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.1.0:*:*:*:*:*:*:*", - "matchCriteriaId": "19837144-FBCC-4B36-BAF4-FCD9F9C2AAE5" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.1.1:*:*:*:*:*:*:*", - "matchCriteriaId": "D0DB1BAA-3729-48BD-A8D0-5BBF3D4ABDE6" - }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.2:*:*:*:*:*:*:*", @@ -97,11 +107,6 @@ "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.3:*:*:*:*:*:*:*", "matchCriteriaId": "697EA344-F982-4E9F-9EC8-CCCB5829582B" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.3.0:*:*:*:*:*:*:*", - "matchCriteriaId": "5C699284-7876-4C8D-B259-B97C60C9A349" - }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.4:*:*:*:*:*:*:*", @@ -117,11 +122,6 @@ "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "4C9244A7-665A-48DE-89C9-C76E7A4556F5" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.5.2:*:*:*:*:*:*:*", - "matchCriteriaId": "2E6787E1-0523-49B7-B9B3-74F2D43DB714" - }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*", diff --git a/CVE-2015/CVE-2015-08xx/CVE-2015-0822.json b/CVE-2015/CVE-2015-08xx/CVE-2015-0822.json index cebf404b150..13d70f621b8 100644 --- a/CVE-2015/CVE-2015-08xx/CVE-2015-0822.json +++ b/CVE-2015/CVE-2015-08xx/CVE-2015-0822.json @@ -2,7 +2,7 @@ "id": "CVE-2015-0822", "sourceIdentifier": "security@mozilla.org", "published": "2015-02-25T11:59:03.437", - "lastModified": "2016-12-24T02:59:05.790", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -1270,19 +1270,19 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.0:*:*:*:*:*:*:*", - "matchCriteriaId": "992DDB6B-F32C-4E80-B386-EB1643D079E4" + "criteria": "cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*", + "matchCriteriaId": "C11F024A-A8B7-405B-8A13-4BF406FBDB22" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:31.1.1:*:*:*:*:*:*:*", + "matchCriteriaId": "84E8D7C7-B578-4623-9EA2-D13965DBE1F3" }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.1:*:*:*:*:*:*:*", "matchCriteriaId": "6D7AAC77-57A3-4747-B760-0EE3CD53E4DE" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.1.1:*:*:*:*:*:*:*", - "matchCriteriaId": "D0DB1BAA-3729-48BD-A8D0-5BBF3D4ABDE6" - }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.2:*:*:*:*:*:*:*", diff --git a/CVE-2015/CVE-2015-08xx/CVE-2015-0827.json b/CVE-2015/CVE-2015-08xx/CVE-2015-0827.json index b5f6b2e8f1e..065b354d9f1 100644 --- a/CVE-2015/CVE-2015-08xx/CVE-2015-0827.json +++ b/CVE-2015/CVE-2015-08xx/CVE-2015-0827.json @@ -2,7 +2,7 @@ "id": "CVE-2015-0827", "sourceIdentifier": "security@mozilla.org", "published": "2015-02-25T11:59:08.063", - "lastModified": "2016-12-24T02:59:05.917", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -1234,19 +1234,19 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.0:*:*:*:*:*:*:*", - "matchCriteriaId": "992DDB6B-F32C-4E80-B386-EB1643D079E4" + "criteria": "cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*", + "matchCriteriaId": "C11F024A-A8B7-405B-8A13-4BF406FBDB22" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:31.1.1:*:*:*:*:*:*:*", + "matchCriteriaId": "84E8D7C7-B578-4623-9EA2-D13965DBE1F3" }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.1:*:*:*:*:*:*:*", "matchCriteriaId": "6D7AAC77-57A3-4747-B760-0EE3CD53E4DE" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.1.1:*:*:*:*:*:*:*", - "matchCriteriaId": "D0DB1BAA-3729-48BD-A8D0-5BBF3D4ABDE6" - }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.2:*:*:*:*:*:*:*", diff --git a/CVE-2015/CVE-2015-08xx/CVE-2015-0831.json b/CVE-2015/CVE-2015-08xx/CVE-2015-0831.json index 17c3281123f..1f0618cc521 100644 --- a/CVE-2015/CVE-2015-08xx/CVE-2015-0831.json +++ b/CVE-2015/CVE-2015-08xx/CVE-2015-0831.json @@ -2,7 +2,7 @@ "id": "CVE-2015-0831", "sourceIdentifier": "security@mozilla.org", "published": "2015-02-25T11:59:11.780", - "lastModified": "2019-04-22T17:48:00.643", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "evaluatorComment": "CWE-416: Use After Free", @@ -1271,19 +1271,19 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.0:*:*:*:*:*:*:*", - "matchCriteriaId": "992DDB6B-F32C-4E80-B386-EB1643D079E4" + "criteria": "cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*", + "matchCriteriaId": "C11F024A-A8B7-405B-8A13-4BF406FBDB22" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:31.1.1:*:*:*:*:*:*:*", + "matchCriteriaId": "84E8D7C7-B578-4623-9EA2-D13965DBE1F3" }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.1:*:*:*:*:*:*:*", "matchCriteriaId": "6D7AAC77-57A3-4747-B760-0EE3CD53E4DE" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.1.1:*:*:*:*:*:*:*", - "matchCriteriaId": "D0DB1BAA-3729-48BD-A8D0-5BBF3D4ABDE6" - }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.2:*:*:*:*:*:*:*", diff --git a/CVE-2015/CVE-2015-08xx/CVE-2015-0833.json b/CVE-2015/CVE-2015-08xx/CVE-2015-0833.json index 8709ed28eb3..f1aaa6474e0 100644 --- a/CVE-2015/CVE-2015-08xx/CVE-2015-0833.json +++ b/CVE-2015/CVE-2015-08xx/CVE-2015-0833.json @@ -2,7 +2,7 @@ "id": "CVE-2015-0833", "sourceIdentifier": "security@mozilla.org", "published": "2015-02-25T11:59:13.673", - "lastModified": "2018-10-30T16:27:35.843", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "evaluatorComment": "CWE-426: Untrusted Search Path", @@ -1321,19 +1321,19 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.0:*:*:*:*:*:*:*", - "matchCriteriaId": "992DDB6B-F32C-4E80-B386-EB1643D079E4" + "criteria": "cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*", + "matchCriteriaId": "C11F024A-A8B7-405B-8A13-4BF406FBDB22" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:31.1.1:*:*:*:*:*:*:*", + "matchCriteriaId": "84E8D7C7-B578-4623-9EA2-D13965DBE1F3" }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.1:*:*:*:*:*:*:*", "matchCriteriaId": "6D7AAC77-57A3-4747-B760-0EE3CD53E4DE" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.1.1:*:*:*:*:*:*:*", - "matchCriteriaId": "D0DB1BAA-3729-48BD-A8D0-5BBF3D4ABDE6" - }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.2:*:*:*:*:*:*:*", diff --git a/CVE-2015/CVE-2015-08xx/CVE-2015-0836.json b/CVE-2015/CVE-2015-08xx/CVE-2015-0836.json index 9227c696f5e..2cfa29d995e 100644 --- a/CVE-2015/CVE-2015-08xx/CVE-2015-0836.json +++ b/CVE-2015/CVE-2015-08xx/CVE-2015-0836.json @@ -2,7 +2,7 @@ "id": "CVE-2015-0836", "sourceIdentifier": "security@mozilla.org", "published": "2015-02-25T11:59:16.297", - "lastModified": "2016-12-24T02:59:06.227", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -63,19 +63,19 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.0:*:*:*:*:*:*:*", - "matchCriteriaId": "992DDB6B-F32C-4E80-B386-EB1643D079E4" + "criteria": "cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*", + "matchCriteriaId": "C11F024A-A8B7-405B-8A13-4BF406FBDB22" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:31.1.1:*:*:*:*:*:*:*", + "matchCriteriaId": "84E8D7C7-B578-4623-9EA2-D13965DBE1F3" }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.1:*:*:*:*:*:*:*", "matchCriteriaId": "6D7AAC77-57A3-4747-B760-0EE3CD53E4DE" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.1.1:*:*:*:*:*:*:*", - "matchCriteriaId": "D0DB1BAA-3729-48BD-A8D0-5BBF3D4ABDE6" - }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.2:*:*:*:*:*:*:*", diff --git a/CVE-2015/CVE-2015-27xx/CVE-2015-2708.json b/CVE-2015/CVE-2015-27xx/CVE-2015-2708.json index 0f593a5af36..679828ab01f 100644 --- a/CVE-2015/CVE-2015-27xx/CVE-2015-2708.json +++ b/CVE-2015/CVE-2015-27xx/CVE-2015-2708.json @@ -2,7 +2,7 @@ "id": "CVE-2015-2708", "sourceIdentifier": "security@mozilla.org", "published": "2015-05-14T10:59:01.367", - "lastModified": "2023-09-12T14:55:31.563", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -130,24 +130,39 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.0:*:*:*:*:*:*:*", - "matchCriteriaId": "992DDB6B-F32C-4E80-B386-EB1643D079E4" + "criteria": "cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*", + "matchCriteriaId": "C11F024A-A8B7-405B-8A13-4BF406FBDB22" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "D81A3698-797C-4CD9-BB02-A9182E0A6E11" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:31.1.1:*:*:*:*:*:*:*", + "matchCriteriaId": "84E8D7C7-B578-4623-9EA2-D13965DBE1F3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:31.3.0:*:*:*:*:*:*:*", + "matchCriteriaId": "C3E5D043-71F8-4A61-BEA4-176153E26FD6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:31.5.2:*:*:*:*:*:*:*", + "matchCriteriaId": "902BF23B-C1B9-41F2-BF5D-C1722C3DBFFD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:31.5.3:*:*:*:*:*:*:*", + "matchCriteriaId": "60521E93-3495-40F7-AA72-EE531F8FA09D" }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.1:*:*:*:*:*:*:*", "matchCriteriaId": "6D7AAC77-57A3-4747-B760-0EE3CD53E4DE" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.1.0:*:*:*:*:*:*:*", - "matchCriteriaId": "19837144-FBCC-4B36-BAF4-FCD9F9C2AAE5" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.1.1:*:*:*:*:*:*:*", - "matchCriteriaId": "D0DB1BAA-3729-48BD-A8D0-5BBF3D4ABDE6" - }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.2:*:*:*:*:*:*:*", @@ -158,11 +173,6 @@ "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.3:*:*:*:*:*:*:*", "matchCriteriaId": "697EA344-F982-4E9F-9EC8-CCCB5829582B" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.3.0:*:*:*:*:*:*:*", - "matchCriteriaId": "5C699284-7876-4C8D-B259-B97C60C9A349" - }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.4:*:*:*:*:*:*:*", @@ -178,16 +188,6 @@ "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "4C9244A7-665A-48DE-89C9-C76E7A4556F5" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.5.2:*:*:*:*:*:*:*", - "matchCriteriaId": "2E6787E1-0523-49B7-B9B3-74F2D43DB714" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.5.3:*:*:*:*:*:*:*", - "matchCriteriaId": "AA842900-6ABD-4493-A5FF-C8840B081190" - }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.6.0:*:*:*:*:*:*:*", diff --git a/CVE-2015/CVE-2015-27xx/CVE-2015-2710.json b/CVE-2015/CVE-2015-27xx/CVE-2015-2710.json index 9854bd50fac..add827f3624 100644 --- a/CVE-2015/CVE-2015-27xx/CVE-2015-2710.json +++ b/CVE-2015/CVE-2015-27xx/CVE-2015-2710.json @@ -2,7 +2,7 @@ "id": "CVE-2015-2710", "sourceIdentifier": "security@mozilla.org", "published": "2015-05-14T10:59:03.383", - "lastModified": "2023-09-12T14:55:31.563", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -79,24 +79,39 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.0:*:*:*:*:*:*:*", - "matchCriteriaId": "992DDB6B-F32C-4E80-B386-EB1643D079E4" + "criteria": "cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*", + "matchCriteriaId": "C11F024A-A8B7-405B-8A13-4BF406FBDB22" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "D81A3698-797C-4CD9-BB02-A9182E0A6E11" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:31.1.1:*:*:*:*:*:*:*", + "matchCriteriaId": "84E8D7C7-B578-4623-9EA2-D13965DBE1F3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:31.3.0:*:*:*:*:*:*:*", + "matchCriteriaId": "C3E5D043-71F8-4A61-BEA4-176153E26FD6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:31.5.2:*:*:*:*:*:*:*", + "matchCriteriaId": "902BF23B-C1B9-41F2-BF5D-C1722C3DBFFD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:31.5.3:*:*:*:*:*:*:*", + "matchCriteriaId": "60521E93-3495-40F7-AA72-EE531F8FA09D" }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.1:*:*:*:*:*:*:*", "matchCriteriaId": "6D7AAC77-57A3-4747-B760-0EE3CD53E4DE" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.1.0:*:*:*:*:*:*:*", - "matchCriteriaId": "19837144-FBCC-4B36-BAF4-FCD9F9C2AAE5" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.1.1:*:*:*:*:*:*:*", - "matchCriteriaId": "D0DB1BAA-3729-48BD-A8D0-5BBF3D4ABDE6" - }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.2:*:*:*:*:*:*:*", @@ -107,11 +122,6 @@ "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.3:*:*:*:*:*:*:*", "matchCriteriaId": "697EA344-F982-4E9F-9EC8-CCCB5829582B" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.3.0:*:*:*:*:*:*:*", - "matchCriteriaId": "5C699284-7876-4C8D-B259-B97C60C9A349" - }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.4:*:*:*:*:*:*:*", @@ -127,16 +137,6 @@ "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "4C9244A7-665A-48DE-89C9-C76E7A4556F5" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.5.2:*:*:*:*:*:*:*", - "matchCriteriaId": "2E6787E1-0523-49B7-B9B3-74F2D43DB714" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.5.3:*:*:*:*:*:*:*", - "matchCriteriaId": "AA842900-6ABD-4493-A5FF-C8840B081190" - }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.6.0:*:*:*:*:*:*:*", diff --git a/CVE-2015/CVE-2015-27xx/CVE-2015-2713.json b/CVE-2015/CVE-2015-27xx/CVE-2015-2713.json index 84f140f4bb0..c36828a4464 100644 --- a/CVE-2015/CVE-2015-27xx/CVE-2015-2713.json +++ b/CVE-2015/CVE-2015-27xx/CVE-2015-2713.json @@ -2,7 +2,7 @@ "id": "CVE-2015-2713", "sourceIdentifier": "security@mozilla.org", "published": "2015-05-14T10:59:06.240", - "lastModified": "2023-09-12T14:55:31.563", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "evaluatorComment": "CWE-416: Use After Free", @@ -131,24 +131,39 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.0:*:*:*:*:*:*:*", - "matchCriteriaId": "992DDB6B-F32C-4E80-B386-EB1643D079E4" + "criteria": "cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*", + "matchCriteriaId": "C11F024A-A8B7-405B-8A13-4BF406FBDB22" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "D81A3698-797C-4CD9-BB02-A9182E0A6E11" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:31.1.1:*:*:*:*:*:*:*", + "matchCriteriaId": "84E8D7C7-B578-4623-9EA2-D13965DBE1F3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:31.3.0:*:*:*:*:*:*:*", + "matchCriteriaId": "C3E5D043-71F8-4A61-BEA4-176153E26FD6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:31.5.2:*:*:*:*:*:*:*", + "matchCriteriaId": "902BF23B-C1B9-41F2-BF5D-C1722C3DBFFD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:31.5.3:*:*:*:*:*:*:*", + "matchCriteriaId": "60521E93-3495-40F7-AA72-EE531F8FA09D" }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.1:*:*:*:*:*:*:*", "matchCriteriaId": "6D7AAC77-57A3-4747-B760-0EE3CD53E4DE" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.1.0:*:*:*:*:*:*:*", - "matchCriteriaId": "19837144-FBCC-4B36-BAF4-FCD9F9C2AAE5" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.1.1:*:*:*:*:*:*:*", - "matchCriteriaId": "D0DB1BAA-3729-48BD-A8D0-5BBF3D4ABDE6" - }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.2:*:*:*:*:*:*:*", @@ -159,11 +174,6 @@ "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.3:*:*:*:*:*:*:*", "matchCriteriaId": "697EA344-F982-4E9F-9EC8-CCCB5829582B" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.3.0:*:*:*:*:*:*:*", - "matchCriteriaId": "5C699284-7876-4C8D-B259-B97C60C9A349" - }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.4:*:*:*:*:*:*:*", @@ -179,16 +189,6 @@ "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "4C9244A7-665A-48DE-89C9-C76E7A4556F5" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.5.2:*:*:*:*:*:*:*", - "matchCriteriaId": "2E6787E1-0523-49B7-B9B3-74F2D43DB714" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.5.3:*:*:*:*:*:*:*", - "matchCriteriaId": "AA842900-6ABD-4493-A5FF-C8840B081190" - }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.6.0:*:*:*:*:*:*:*", diff --git a/CVE-2015/CVE-2015-27xx/CVE-2015-2716.json b/CVE-2015/CVE-2015-27xx/CVE-2015-2716.json index f62311a9bdb..739a20cf228 100644 --- a/CVE-2015/CVE-2015-27xx/CVE-2015-2716.json +++ b/CVE-2015/CVE-2015-27xx/CVE-2015-2716.json @@ -2,7 +2,7 @@ "id": "CVE-2015-2716", "sourceIdentifier": "security@mozilla.org", "published": "2015-05-14T10:59:09.117", - "lastModified": "2023-09-12T14:55:31.563", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -145,24 +145,39 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.0:*:*:*:*:*:*:*", - "matchCriteriaId": "992DDB6B-F32C-4E80-B386-EB1643D079E4" + "criteria": "cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*", + "matchCriteriaId": "C11F024A-A8B7-405B-8A13-4BF406FBDB22" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "D81A3698-797C-4CD9-BB02-A9182E0A6E11" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:31.1.1:*:*:*:*:*:*:*", + "matchCriteriaId": "84E8D7C7-B578-4623-9EA2-D13965DBE1F3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:31.3.0:*:*:*:*:*:*:*", + "matchCriteriaId": "C3E5D043-71F8-4A61-BEA4-176153E26FD6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:31.5.2:*:*:*:*:*:*:*", + "matchCriteriaId": "902BF23B-C1B9-41F2-BF5D-C1722C3DBFFD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:31.5.3:*:*:*:*:*:*:*", + "matchCriteriaId": "60521E93-3495-40F7-AA72-EE531F8FA09D" }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.1:*:*:*:*:*:*:*", "matchCriteriaId": "6D7AAC77-57A3-4747-B760-0EE3CD53E4DE" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.1.0:*:*:*:*:*:*:*", - "matchCriteriaId": "19837144-FBCC-4B36-BAF4-FCD9F9C2AAE5" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.1.1:*:*:*:*:*:*:*", - "matchCriteriaId": "D0DB1BAA-3729-48BD-A8D0-5BBF3D4ABDE6" - }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.2:*:*:*:*:*:*:*", @@ -173,11 +188,6 @@ "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.3:*:*:*:*:*:*:*", "matchCriteriaId": "697EA344-F982-4E9F-9EC8-CCCB5829582B" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.3.0:*:*:*:*:*:*:*", - "matchCriteriaId": "5C699284-7876-4C8D-B259-B97C60C9A349" - }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.4:*:*:*:*:*:*:*", @@ -193,16 +203,6 @@ "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "4C9244A7-665A-48DE-89C9-C76E7A4556F5" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.5.2:*:*:*:*:*:*:*", - "matchCriteriaId": "2E6787E1-0523-49B7-B9B3-74F2D43DB714" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.5.3:*:*:*:*:*:*:*", - "matchCriteriaId": "AA842900-6ABD-4493-A5FF-C8840B081190" - }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.6.0:*:*:*:*:*:*:*", diff --git a/CVE-2015/CVE-2015-27xx/CVE-2015-2721.json b/CVE-2015/CVE-2015-27xx/CVE-2015-2721.json index 45b527564c3..60ebf24d261 100644 --- a/CVE-2015/CVE-2015-27xx/CVE-2015-2721.json +++ b/CVE-2015/CVE-2015-27xx/CVE-2015-2721.json @@ -2,7 +2,7 @@ "id": "CVE-2015-2721", "sourceIdentifier": "security@mozilla.org", "published": "2015-07-06T02:00:49.283", - "lastModified": "2023-09-12T14:55:31.563", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -141,24 +141,39 @@ }, { "vulnerable": false, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.0:*:*:*:*:*:*:*", - "matchCriteriaId": "992DDB6B-F32C-4E80-B386-EB1643D079E4" + "criteria": "cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*", + "matchCriteriaId": "C11F024A-A8B7-405B-8A13-4BF406FBDB22" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "D81A3698-797C-4CD9-BB02-A9182E0A6E11" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:a:mozilla:firefox:31.1.1:*:*:*:*:*:*:*", + "matchCriteriaId": "84E8D7C7-B578-4623-9EA2-D13965DBE1F3" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:a:mozilla:firefox:31.3.0:*:*:*:*:*:*:*", + "matchCriteriaId": "C3E5D043-71F8-4A61-BEA4-176153E26FD6" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:a:mozilla:firefox:31.5.2:*:*:*:*:*:*:*", + "matchCriteriaId": "902BF23B-C1B9-41F2-BF5D-C1722C3DBFFD" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:a:mozilla:firefox:31.5.3:*:*:*:*:*:*:*", + "matchCriteriaId": "60521E93-3495-40F7-AA72-EE531F8FA09D" }, { "vulnerable": false, "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.1:*:*:*:*:*:*:*", "matchCriteriaId": "6D7AAC77-57A3-4747-B760-0EE3CD53E4DE" }, - { - "vulnerable": false, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.1.0:*:*:*:*:*:*:*", - "matchCriteriaId": "19837144-FBCC-4B36-BAF4-FCD9F9C2AAE5" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.1.1:*:*:*:*:*:*:*", - "matchCriteriaId": "D0DB1BAA-3729-48BD-A8D0-5BBF3D4ABDE6" - }, { "vulnerable": false, "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.2:*:*:*:*:*:*:*", @@ -169,11 +184,6 @@ "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.3:*:*:*:*:*:*:*", "matchCriteriaId": "697EA344-F982-4E9F-9EC8-CCCB5829582B" }, - { - "vulnerable": false, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.3.0:*:*:*:*:*:*:*", - "matchCriteriaId": "5C699284-7876-4C8D-B259-B97C60C9A349" - }, { "vulnerable": false, "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.4:*:*:*:*:*:*:*", @@ -189,16 +199,6 @@ "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "4C9244A7-665A-48DE-89C9-C76E7A4556F5" }, - { - "vulnerable": false, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.5.2:*:*:*:*:*:*:*", - "matchCriteriaId": "2E6787E1-0523-49B7-B9B3-74F2D43DB714" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.5.3:*:*:*:*:*:*:*", - "matchCriteriaId": "AA842900-6ABD-4493-A5FF-C8840B081190" - }, { "vulnerable": false, "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.6.0:*:*:*:*:*:*:*", diff --git a/CVE-2015/CVE-2015-27xx/CVE-2015-2722.json b/CVE-2015/CVE-2015-27xx/CVE-2015-2722.json index 845400f5bb3..f2369e7cf43 100644 --- a/CVE-2015/CVE-2015-27xx/CVE-2015-2722.json +++ b/CVE-2015/CVE-2015-27xx/CVE-2015-2722.json @@ -2,7 +2,7 @@ "id": "CVE-2015-2722", "sourceIdentifier": "security@mozilla.org", "published": "2015-07-06T02:00:54.953", - "lastModified": "2023-09-12T14:55:31.563", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "evaluatorComment": "CWE-416: Use After Free", @@ -79,24 +79,39 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.0:*:*:*:*:*:*:*", - "matchCriteriaId": "992DDB6B-F32C-4E80-B386-EB1643D079E4" + "criteria": "cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*", + "matchCriteriaId": "C11F024A-A8B7-405B-8A13-4BF406FBDB22" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "D81A3698-797C-4CD9-BB02-A9182E0A6E11" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:31.1.1:*:*:*:*:*:*:*", + "matchCriteriaId": "84E8D7C7-B578-4623-9EA2-D13965DBE1F3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:31.3.0:*:*:*:*:*:*:*", + "matchCriteriaId": "C3E5D043-71F8-4A61-BEA4-176153E26FD6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:31.5.2:*:*:*:*:*:*:*", + "matchCriteriaId": "902BF23B-C1B9-41F2-BF5D-C1722C3DBFFD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:31.5.3:*:*:*:*:*:*:*", + "matchCriteriaId": "60521E93-3495-40F7-AA72-EE531F8FA09D" }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.1:*:*:*:*:*:*:*", "matchCriteriaId": "6D7AAC77-57A3-4747-B760-0EE3CD53E4DE" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.1.0:*:*:*:*:*:*:*", - "matchCriteriaId": "19837144-FBCC-4B36-BAF4-FCD9F9C2AAE5" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.1.1:*:*:*:*:*:*:*", - "matchCriteriaId": "D0DB1BAA-3729-48BD-A8D0-5BBF3D4ABDE6" - }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.2:*:*:*:*:*:*:*", @@ -107,11 +122,6 @@ "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.3:*:*:*:*:*:*:*", "matchCriteriaId": "697EA344-F982-4E9F-9EC8-CCCB5829582B" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.3.0:*:*:*:*:*:*:*", - "matchCriteriaId": "5C699284-7876-4C8D-B259-B97C60C9A349" - }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.4:*:*:*:*:*:*:*", @@ -127,16 +137,6 @@ "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "4C9244A7-665A-48DE-89C9-C76E7A4556F5" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.5.2:*:*:*:*:*:*:*", - "matchCriteriaId": "2E6787E1-0523-49B7-B9B3-74F2D43DB714" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.5.3:*:*:*:*:*:*:*", - "matchCriteriaId": "AA842900-6ABD-4493-A5FF-C8840B081190" - }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.6.0:*:*:*:*:*:*:*", diff --git a/CVE-2015/CVE-2015-27xx/CVE-2015-2724.json b/CVE-2015/CVE-2015-27xx/CVE-2015-2724.json index 629011d8e9d..3c0d03803f3 100644 --- a/CVE-2015/CVE-2015-27xx/CVE-2015-2724.json +++ b/CVE-2015/CVE-2015-27xx/CVE-2015-2724.json @@ -2,7 +2,7 @@ "id": "CVE-2015-2724", "sourceIdentifier": "security@mozilla.org", "published": "2015-07-06T02:00:55.830", - "lastModified": "2023-09-12T14:55:31.563", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -78,24 +78,39 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.0:*:*:*:*:*:*:*", - "matchCriteriaId": "992DDB6B-F32C-4E80-B386-EB1643D079E4" + "criteria": "cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*", + "matchCriteriaId": "C11F024A-A8B7-405B-8A13-4BF406FBDB22" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "D81A3698-797C-4CD9-BB02-A9182E0A6E11" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:31.1.1:*:*:*:*:*:*:*", + "matchCriteriaId": "84E8D7C7-B578-4623-9EA2-D13965DBE1F3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:31.3.0:*:*:*:*:*:*:*", + "matchCriteriaId": "C3E5D043-71F8-4A61-BEA4-176153E26FD6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:31.5.2:*:*:*:*:*:*:*", + "matchCriteriaId": "902BF23B-C1B9-41F2-BF5D-C1722C3DBFFD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:31.5.3:*:*:*:*:*:*:*", + "matchCriteriaId": "60521E93-3495-40F7-AA72-EE531F8FA09D" }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.1:*:*:*:*:*:*:*", "matchCriteriaId": "6D7AAC77-57A3-4747-B760-0EE3CD53E4DE" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.1.0:*:*:*:*:*:*:*", - "matchCriteriaId": "19837144-FBCC-4B36-BAF4-FCD9F9C2AAE5" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.1.1:*:*:*:*:*:*:*", - "matchCriteriaId": "D0DB1BAA-3729-48BD-A8D0-5BBF3D4ABDE6" - }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.2:*:*:*:*:*:*:*", @@ -106,11 +121,6 @@ "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.3:*:*:*:*:*:*:*", "matchCriteriaId": "697EA344-F982-4E9F-9EC8-CCCB5829582B" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.3.0:*:*:*:*:*:*:*", - "matchCriteriaId": "5C699284-7876-4C8D-B259-B97C60C9A349" - }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.4:*:*:*:*:*:*:*", @@ -126,16 +136,6 @@ "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "4C9244A7-665A-48DE-89C9-C76E7A4556F5" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.5.2:*:*:*:*:*:*:*", - "matchCriteriaId": "2E6787E1-0523-49B7-B9B3-74F2D43DB714" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.5.3:*:*:*:*:*:*:*", - "matchCriteriaId": "AA842900-6ABD-4493-A5FF-C8840B081190" - }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.6.0:*:*:*:*:*:*:*", diff --git a/CVE-2015/CVE-2015-27xx/CVE-2015-2725.json b/CVE-2015/CVE-2015-27xx/CVE-2015-2725.json index 69c6f500647..4f744a31412 100644 --- a/CVE-2015/CVE-2015-27xx/CVE-2015-2725.json +++ b/CVE-2015/CVE-2015-27xx/CVE-2015-2725.json @@ -2,7 +2,7 @@ "id": "CVE-2015-2725", "sourceIdentifier": "security@mozilla.org", "published": "2015-07-06T02:00:56.737", - "lastModified": "2023-09-12T14:55:31.563", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -108,24 +108,39 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.0:*:*:*:*:*:*:*", - "matchCriteriaId": "992DDB6B-F32C-4E80-B386-EB1643D079E4" + "criteria": "cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*", + "matchCriteriaId": "C11F024A-A8B7-405B-8A13-4BF406FBDB22" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "D81A3698-797C-4CD9-BB02-A9182E0A6E11" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:31.1.1:*:*:*:*:*:*:*", + "matchCriteriaId": "84E8D7C7-B578-4623-9EA2-D13965DBE1F3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:31.3.0:*:*:*:*:*:*:*", + "matchCriteriaId": "C3E5D043-71F8-4A61-BEA4-176153E26FD6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:31.5.2:*:*:*:*:*:*:*", + "matchCriteriaId": "902BF23B-C1B9-41F2-BF5D-C1722C3DBFFD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:31.5.3:*:*:*:*:*:*:*", + "matchCriteriaId": "60521E93-3495-40F7-AA72-EE531F8FA09D" }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.1:*:*:*:*:*:*:*", "matchCriteriaId": "6D7AAC77-57A3-4747-B760-0EE3CD53E4DE" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.1.0:*:*:*:*:*:*:*", - "matchCriteriaId": "19837144-FBCC-4B36-BAF4-FCD9F9C2AAE5" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.1.1:*:*:*:*:*:*:*", - "matchCriteriaId": "D0DB1BAA-3729-48BD-A8D0-5BBF3D4ABDE6" - }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.2:*:*:*:*:*:*:*", @@ -136,11 +151,6 @@ "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.3:*:*:*:*:*:*:*", "matchCriteriaId": "697EA344-F982-4E9F-9EC8-CCCB5829582B" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.3.0:*:*:*:*:*:*:*", - "matchCriteriaId": "5C699284-7876-4C8D-B259-B97C60C9A349" - }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.4:*:*:*:*:*:*:*", @@ -156,16 +166,6 @@ "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "4C9244A7-665A-48DE-89C9-C76E7A4556F5" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.5.2:*:*:*:*:*:*:*", - "matchCriteriaId": "2E6787E1-0523-49B7-B9B3-74F2D43DB714" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.5.3:*:*:*:*:*:*:*", - "matchCriteriaId": "AA842900-6ABD-4493-A5FF-C8840B081190" - }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.6.0:*:*:*:*:*:*:*", diff --git a/CVE-2015/CVE-2015-27xx/CVE-2015-2728.json b/CVE-2015/CVE-2015-27xx/CVE-2015-2728.json index 114325902ba..faad74eb805 100644 --- a/CVE-2015/CVE-2015-27xx/CVE-2015-2728.json +++ b/CVE-2015/CVE-2015-27xx/CVE-2015-2728.json @@ -2,7 +2,7 @@ "id": "CVE-2015-2728", "sourceIdentifier": "security@mozilla.org", "published": "2015-07-06T02:00:59.423", - "lastModified": "2016-12-28T02:59:08.543", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "evaluatorComment": "CWE-843: Access of Resource Using Incompatible Type ('Type Confusion')", @@ -89,24 +89,39 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.0:*:*:*:*:*:*:*", - "matchCriteriaId": "992DDB6B-F32C-4E80-B386-EB1643D079E4" + "criteria": "cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*", + "matchCriteriaId": "C11F024A-A8B7-405B-8A13-4BF406FBDB22" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "D81A3698-797C-4CD9-BB02-A9182E0A6E11" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:31.1.1:*:*:*:*:*:*:*", + "matchCriteriaId": "84E8D7C7-B578-4623-9EA2-D13965DBE1F3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:31.3.0:*:*:*:*:*:*:*", + "matchCriteriaId": "C3E5D043-71F8-4A61-BEA4-176153E26FD6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:31.5.2:*:*:*:*:*:*:*", + "matchCriteriaId": "902BF23B-C1B9-41F2-BF5D-C1722C3DBFFD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:31.5.3:*:*:*:*:*:*:*", + "matchCriteriaId": "60521E93-3495-40F7-AA72-EE531F8FA09D" }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.1:*:*:*:*:*:*:*", "matchCriteriaId": "6D7AAC77-57A3-4747-B760-0EE3CD53E4DE" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.1.0:*:*:*:*:*:*:*", - "matchCriteriaId": "19837144-FBCC-4B36-BAF4-FCD9F9C2AAE5" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.1.1:*:*:*:*:*:*:*", - "matchCriteriaId": "D0DB1BAA-3729-48BD-A8D0-5BBF3D4ABDE6" - }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.2:*:*:*:*:*:*:*", @@ -117,11 +132,6 @@ "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.3:*:*:*:*:*:*:*", "matchCriteriaId": "697EA344-F982-4E9F-9EC8-CCCB5829582B" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.3.0:*:*:*:*:*:*:*", - "matchCriteriaId": "5C699284-7876-4C8D-B259-B97C60C9A349" - }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.4:*:*:*:*:*:*:*", @@ -137,16 +147,6 @@ "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "4C9244A7-665A-48DE-89C9-C76E7A4556F5" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.5.2:*:*:*:*:*:*:*", - "matchCriteriaId": "2E6787E1-0523-49B7-B9B3-74F2D43DB714" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.5.3:*:*:*:*:*:*:*", - "matchCriteriaId": "AA842900-6ABD-4493-A5FF-C8840B081190" - }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.6.0:*:*:*:*:*:*:*", diff --git a/CVE-2015/CVE-2015-27xx/CVE-2015-2729.json b/CVE-2015/CVE-2015-27xx/CVE-2015-2729.json index 53d34cfe0bc..24bb9d955ae 100644 --- a/CVE-2015/CVE-2015-27xx/CVE-2015-2729.json +++ b/CVE-2015/CVE-2015-27xx/CVE-2015-2729.json @@ -2,7 +2,7 @@ "id": "CVE-2015-2729", "sourceIdentifier": "security@mozilla.org", "published": "2015-07-06T02:01:00.313", - "lastModified": "2016-12-28T02:59:08.637", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -63,24 +63,39 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.0:*:*:*:*:*:*:*", - "matchCriteriaId": "992DDB6B-F32C-4E80-B386-EB1643D079E4" + "criteria": "cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*", + "matchCriteriaId": "C11F024A-A8B7-405B-8A13-4BF406FBDB22" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "D81A3698-797C-4CD9-BB02-A9182E0A6E11" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:31.1.1:*:*:*:*:*:*:*", + "matchCriteriaId": "84E8D7C7-B578-4623-9EA2-D13965DBE1F3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:31.3.0:*:*:*:*:*:*:*", + "matchCriteriaId": "C3E5D043-71F8-4A61-BEA4-176153E26FD6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:31.5.2:*:*:*:*:*:*:*", + "matchCriteriaId": "902BF23B-C1B9-41F2-BF5D-C1722C3DBFFD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:31.5.3:*:*:*:*:*:*:*", + "matchCriteriaId": "60521E93-3495-40F7-AA72-EE531F8FA09D" }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.1:*:*:*:*:*:*:*", "matchCriteriaId": "6D7AAC77-57A3-4747-B760-0EE3CD53E4DE" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.1.0:*:*:*:*:*:*:*", - "matchCriteriaId": "19837144-FBCC-4B36-BAF4-FCD9F9C2AAE5" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.1.1:*:*:*:*:*:*:*", - "matchCriteriaId": "D0DB1BAA-3729-48BD-A8D0-5BBF3D4ABDE6" - }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.2:*:*:*:*:*:*:*", @@ -91,11 +106,6 @@ "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.3:*:*:*:*:*:*:*", "matchCriteriaId": "697EA344-F982-4E9F-9EC8-CCCB5829582B" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.3.0:*:*:*:*:*:*:*", - "matchCriteriaId": "5C699284-7876-4C8D-B259-B97C60C9A349" - }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.4:*:*:*:*:*:*:*", @@ -111,16 +121,6 @@ "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "4C9244A7-665A-48DE-89C9-C76E7A4556F5" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.5.2:*:*:*:*:*:*:*", - "matchCriteriaId": "2E6787E1-0523-49B7-B9B3-74F2D43DB714" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.5.3:*:*:*:*:*:*:*", - "matchCriteriaId": "AA842900-6ABD-4493-A5FF-C8840B081190" - }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.6.0:*:*:*:*:*:*:*", diff --git a/CVE-2015/CVE-2015-27xx/CVE-2015-2730.json b/CVE-2015/CVE-2015-27xx/CVE-2015-2730.json index b9aa20ac316..73166e0e2ce 100644 --- a/CVE-2015/CVE-2015-27xx/CVE-2015-2730.json +++ b/CVE-2015/CVE-2015-27xx/CVE-2015-2730.json @@ -2,7 +2,7 @@ "id": "CVE-2015-2730", "sourceIdentifier": "security@mozilla.org", "published": "2015-07-06T02:01:01.250", - "lastModified": "2023-09-12T14:55:31.563", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -122,24 +122,39 @@ }, { "vulnerable": false, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.0:*:*:*:*:*:*:*", - "matchCriteriaId": "992DDB6B-F32C-4E80-B386-EB1643D079E4" + "criteria": "cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*", + "matchCriteriaId": "C11F024A-A8B7-405B-8A13-4BF406FBDB22" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "D81A3698-797C-4CD9-BB02-A9182E0A6E11" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:a:mozilla:firefox:31.1.1:*:*:*:*:*:*:*", + "matchCriteriaId": "84E8D7C7-B578-4623-9EA2-D13965DBE1F3" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:a:mozilla:firefox:31.3.0:*:*:*:*:*:*:*", + "matchCriteriaId": "C3E5D043-71F8-4A61-BEA4-176153E26FD6" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:a:mozilla:firefox:31.5.2:*:*:*:*:*:*:*", + "matchCriteriaId": "902BF23B-C1B9-41F2-BF5D-C1722C3DBFFD" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:a:mozilla:firefox:31.5.3:*:*:*:*:*:*:*", + "matchCriteriaId": "60521E93-3495-40F7-AA72-EE531F8FA09D" }, { "vulnerable": false, "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.1:*:*:*:*:*:*:*", "matchCriteriaId": "6D7AAC77-57A3-4747-B760-0EE3CD53E4DE" }, - { - "vulnerable": false, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.1.0:*:*:*:*:*:*:*", - "matchCriteriaId": "19837144-FBCC-4B36-BAF4-FCD9F9C2AAE5" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.1.1:*:*:*:*:*:*:*", - "matchCriteriaId": "D0DB1BAA-3729-48BD-A8D0-5BBF3D4ABDE6" - }, { "vulnerable": false, "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.2:*:*:*:*:*:*:*", @@ -150,11 +165,6 @@ "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.3:*:*:*:*:*:*:*", "matchCriteriaId": "697EA344-F982-4E9F-9EC8-CCCB5829582B" }, - { - "vulnerable": false, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.3.0:*:*:*:*:*:*:*", - "matchCriteriaId": "5C699284-7876-4C8D-B259-B97C60C9A349" - }, { "vulnerable": false, "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.4:*:*:*:*:*:*:*", @@ -170,16 +180,6 @@ "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "4C9244A7-665A-48DE-89C9-C76E7A4556F5" }, - { - "vulnerable": false, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.5.2:*:*:*:*:*:*:*", - "matchCriteriaId": "2E6787E1-0523-49B7-B9B3-74F2D43DB714" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.5.3:*:*:*:*:*:*:*", - "matchCriteriaId": "AA842900-6ABD-4493-A5FF-C8840B081190" - }, { "vulnerable": false, "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.6.0:*:*:*:*:*:*:*", diff --git a/CVE-2015/CVE-2015-27xx/CVE-2015-2731.json b/CVE-2015/CVE-2015-27xx/CVE-2015-2731.json index e85dde9185f..b848735c11c 100644 --- a/CVE-2015/CVE-2015-27xx/CVE-2015-2731.json +++ b/CVE-2015/CVE-2015-27xx/CVE-2015-2731.json @@ -2,7 +2,7 @@ "id": "CVE-2015-2731", "sourceIdentifier": "security@mozilla.org", "published": "2015-07-06T02:01:02.110", - "lastModified": "2016-12-28T02:59:08.840", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "evaluatorComment": "CWE-416: Use After Free", @@ -111,24 +111,39 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.0:*:*:*:*:*:*:*", - "matchCriteriaId": "992DDB6B-F32C-4E80-B386-EB1643D079E4" + "criteria": "cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*", + "matchCriteriaId": "C11F024A-A8B7-405B-8A13-4BF406FBDB22" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "D81A3698-797C-4CD9-BB02-A9182E0A6E11" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:31.1.1:*:*:*:*:*:*:*", + "matchCriteriaId": "84E8D7C7-B578-4623-9EA2-D13965DBE1F3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:31.3.0:*:*:*:*:*:*:*", + "matchCriteriaId": "C3E5D043-71F8-4A61-BEA4-176153E26FD6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:31.5.2:*:*:*:*:*:*:*", + "matchCriteriaId": "902BF23B-C1B9-41F2-BF5D-C1722C3DBFFD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:31.5.3:*:*:*:*:*:*:*", + "matchCriteriaId": "60521E93-3495-40F7-AA72-EE531F8FA09D" }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.1:*:*:*:*:*:*:*", "matchCriteriaId": "6D7AAC77-57A3-4747-B760-0EE3CD53E4DE" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.1.0:*:*:*:*:*:*:*", - "matchCriteriaId": "19837144-FBCC-4B36-BAF4-FCD9F9C2AAE5" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.1.1:*:*:*:*:*:*:*", - "matchCriteriaId": "D0DB1BAA-3729-48BD-A8D0-5BBF3D4ABDE6" - }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.2:*:*:*:*:*:*:*", @@ -139,11 +154,6 @@ "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.3:*:*:*:*:*:*:*", "matchCriteriaId": "697EA344-F982-4E9F-9EC8-CCCB5829582B" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.3.0:*:*:*:*:*:*:*", - "matchCriteriaId": "5C699284-7876-4C8D-B259-B97C60C9A349" - }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.4:*:*:*:*:*:*:*", @@ -159,16 +169,6 @@ "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "4C9244A7-665A-48DE-89C9-C76E7A4556F5" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.5.2:*:*:*:*:*:*:*", - "matchCriteriaId": "2E6787E1-0523-49B7-B9B3-74F2D43DB714" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.5.3:*:*:*:*:*:*:*", - "matchCriteriaId": "AA842900-6ABD-4493-A5FF-C8840B081190" - }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.6.0:*:*:*:*:*:*:*", diff --git a/CVE-2015/CVE-2015-27xx/CVE-2015-2733.json b/CVE-2015/CVE-2015-27xx/CVE-2015-2733.json index fb412d8b2a6..f90f2dca060 100644 --- a/CVE-2015/CVE-2015-27xx/CVE-2015-2733.json +++ b/CVE-2015/CVE-2015-27xx/CVE-2015-2733.json @@ -2,7 +2,7 @@ "id": "CVE-2015-2733", "sourceIdentifier": "security@mozilla.org", "published": "2015-07-06T02:01:02.937", - "lastModified": "2016-12-28T02:59:08.947", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "evaluatorComment": "CWE-416: Use After Free", @@ -95,24 +95,39 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.0:*:*:*:*:*:*:*", - "matchCriteriaId": "992DDB6B-F32C-4E80-B386-EB1643D079E4" + "criteria": "cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*", + "matchCriteriaId": "C11F024A-A8B7-405B-8A13-4BF406FBDB22" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "D81A3698-797C-4CD9-BB02-A9182E0A6E11" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:31.1.1:*:*:*:*:*:*:*", + "matchCriteriaId": "84E8D7C7-B578-4623-9EA2-D13965DBE1F3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:31.3.0:*:*:*:*:*:*:*", + "matchCriteriaId": "C3E5D043-71F8-4A61-BEA4-176153E26FD6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:31.5.2:*:*:*:*:*:*:*", + "matchCriteriaId": "902BF23B-C1B9-41F2-BF5D-C1722C3DBFFD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:31.5.3:*:*:*:*:*:*:*", + "matchCriteriaId": "60521E93-3495-40F7-AA72-EE531F8FA09D" }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.1:*:*:*:*:*:*:*", "matchCriteriaId": "6D7AAC77-57A3-4747-B760-0EE3CD53E4DE" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.1.0:*:*:*:*:*:*:*", - "matchCriteriaId": "19837144-FBCC-4B36-BAF4-FCD9F9C2AAE5" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.1.1:*:*:*:*:*:*:*", - "matchCriteriaId": "D0DB1BAA-3729-48BD-A8D0-5BBF3D4ABDE6" - }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.2:*:*:*:*:*:*:*", @@ -123,11 +138,6 @@ "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.3:*:*:*:*:*:*:*", "matchCriteriaId": "697EA344-F982-4E9F-9EC8-CCCB5829582B" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.3.0:*:*:*:*:*:*:*", - "matchCriteriaId": "5C699284-7876-4C8D-B259-B97C60C9A349" - }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.4:*:*:*:*:*:*:*", @@ -143,16 +153,6 @@ "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "4C9244A7-665A-48DE-89C9-C76E7A4556F5" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.5.2:*:*:*:*:*:*:*", - "matchCriteriaId": "2E6787E1-0523-49B7-B9B3-74F2D43DB714" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.5.3:*:*:*:*:*:*:*", - "matchCriteriaId": "AA842900-6ABD-4493-A5FF-C8840B081190" - }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.6.0:*:*:*:*:*:*:*", diff --git a/CVE-2015/CVE-2015-27xx/CVE-2015-2734.json b/CVE-2015/CVE-2015-27xx/CVE-2015-2734.json index 30e94c74905..000dc019793 100644 --- a/CVE-2015/CVE-2015-27xx/CVE-2015-2734.json +++ b/CVE-2015/CVE-2015-27xx/CVE-2015-2734.json @@ -2,7 +2,7 @@ "id": "CVE-2015-2734", "sourceIdentifier": "security@mozilla.org", "published": "2015-07-06T02:01:03.797", - "lastModified": "2018-10-30T16:27:37.717", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -93,24 +93,39 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.0:*:*:*:*:*:*:*", - "matchCriteriaId": "992DDB6B-F32C-4E80-B386-EB1643D079E4" + "criteria": "cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*", + "matchCriteriaId": "C11F024A-A8B7-405B-8A13-4BF406FBDB22" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "D81A3698-797C-4CD9-BB02-A9182E0A6E11" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:31.1.1:*:*:*:*:*:*:*", + "matchCriteriaId": "84E8D7C7-B578-4623-9EA2-D13965DBE1F3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:31.3.0:*:*:*:*:*:*:*", + "matchCriteriaId": "C3E5D043-71F8-4A61-BEA4-176153E26FD6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:31.5.2:*:*:*:*:*:*:*", + "matchCriteriaId": "902BF23B-C1B9-41F2-BF5D-C1722C3DBFFD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:31.5.3:*:*:*:*:*:*:*", + "matchCriteriaId": "60521E93-3495-40F7-AA72-EE531F8FA09D" }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.1:*:*:*:*:*:*:*", "matchCriteriaId": "6D7AAC77-57A3-4747-B760-0EE3CD53E4DE" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.1.0:*:*:*:*:*:*:*", - "matchCriteriaId": "19837144-FBCC-4B36-BAF4-FCD9F9C2AAE5" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.1.1:*:*:*:*:*:*:*", - "matchCriteriaId": "D0DB1BAA-3729-48BD-A8D0-5BBF3D4ABDE6" - }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.2:*:*:*:*:*:*:*", @@ -121,11 +136,6 @@ "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.3:*:*:*:*:*:*:*", "matchCriteriaId": "697EA344-F982-4E9F-9EC8-CCCB5829582B" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.3.0:*:*:*:*:*:*:*", - "matchCriteriaId": "5C699284-7876-4C8D-B259-B97C60C9A349" - }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.4:*:*:*:*:*:*:*", @@ -141,16 +151,6 @@ "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "4C9244A7-665A-48DE-89C9-C76E7A4556F5" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.5.2:*:*:*:*:*:*:*", - "matchCriteriaId": "2E6787E1-0523-49B7-B9B3-74F2D43DB714" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.5.3:*:*:*:*:*:*:*", - "matchCriteriaId": "AA842900-6ABD-4493-A5FF-C8840B081190" - }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.6.0:*:*:*:*:*:*:*", diff --git a/CVE-2015/CVE-2015-27xx/CVE-2015-2735.json b/CVE-2015/CVE-2015-27xx/CVE-2015-2735.json index 7d8c8a4a349..7a9d15c9a84 100644 --- a/CVE-2015/CVE-2015-27xx/CVE-2015-2735.json +++ b/CVE-2015/CVE-2015-27xx/CVE-2015-2735.json @@ -2,7 +2,7 @@ "id": "CVE-2015-2735", "sourceIdentifier": "security@mozilla.org", "published": "2015-07-06T02:01:04.563", - "lastModified": "2023-09-12T14:55:31.563", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -79,24 +79,39 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.0:*:*:*:*:*:*:*", - "matchCriteriaId": "992DDB6B-F32C-4E80-B386-EB1643D079E4" + "criteria": "cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*", + "matchCriteriaId": "C11F024A-A8B7-405B-8A13-4BF406FBDB22" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "D81A3698-797C-4CD9-BB02-A9182E0A6E11" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:31.1.1:*:*:*:*:*:*:*", + "matchCriteriaId": "84E8D7C7-B578-4623-9EA2-D13965DBE1F3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:31.3.0:*:*:*:*:*:*:*", + "matchCriteriaId": "C3E5D043-71F8-4A61-BEA4-176153E26FD6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:31.5.2:*:*:*:*:*:*:*", + "matchCriteriaId": "902BF23B-C1B9-41F2-BF5D-C1722C3DBFFD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:31.5.3:*:*:*:*:*:*:*", + "matchCriteriaId": "60521E93-3495-40F7-AA72-EE531F8FA09D" }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.1:*:*:*:*:*:*:*", "matchCriteriaId": "6D7AAC77-57A3-4747-B760-0EE3CD53E4DE" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.1.0:*:*:*:*:*:*:*", - "matchCriteriaId": "19837144-FBCC-4B36-BAF4-FCD9F9C2AAE5" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.1.1:*:*:*:*:*:*:*", - "matchCriteriaId": "D0DB1BAA-3729-48BD-A8D0-5BBF3D4ABDE6" - }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.2:*:*:*:*:*:*:*", @@ -107,11 +122,6 @@ "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.3:*:*:*:*:*:*:*", "matchCriteriaId": "697EA344-F982-4E9F-9EC8-CCCB5829582B" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.3.0:*:*:*:*:*:*:*", - "matchCriteriaId": "5C699284-7876-4C8D-B259-B97C60C9A349" - }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.4:*:*:*:*:*:*:*", @@ -127,16 +137,6 @@ "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "4C9244A7-665A-48DE-89C9-C76E7A4556F5" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.5.2:*:*:*:*:*:*:*", - "matchCriteriaId": "2E6787E1-0523-49B7-B9B3-74F2D43DB714" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.5.3:*:*:*:*:*:*:*", - "matchCriteriaId": "AA842900-6ABD-4493-A5FF-C8840B081190" - }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.6.0:*:*:*:*:*:*:*", diff --git a/CVE-2015/CVE-2015-27xx/CVE-2015-2736.json b/CVE-2015/CVE-2015-27xx/CVE-2015-2736.json index 5df23dec718..483950c52e8 100644 --- a/CVE-2015/CVE-2015-27xx/CVE-2015-2736.json +++ b/CVE-2015/CVE-2015-27xx/CVE-2015-2736.json @@ -2,7 +2,7 @@ "id": "CVE-2015-2736", "sourceIdentifier": "security@mozilla.org", "published": "2015-07-06T02:01:05.343", - "lastModified": "2023-09-12T14:55:31.563", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -95,24 +95,39 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.0:*:*:*:*:*:*:*", - "matchCriteriaId": "992DDB6B-F32C-4E80-B386-EB1643D079E4" + "criteria": "cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*", + "matchCriteriaId": "C11F024A-A8B7-405B-8A13-4BF406FBDB22" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "D81A3698-797C-4CD9-BB02-A9182E0A6E11" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:31.1.1:*:*:*:*:*:*:*", + "matchCriteriaId": "84E8D7C7-B578-4623-9EA2-D13965DBE1F3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:31.3.0:*:*:*:*:*:*:*", + "matchCriteriaId": "C3E5D043-71F8-4A61-BEA4-176153E26FD6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:31.5.2:*:*:*:*:*:*:*", + "matchCriteriaId": "902BF23B-C1B9-41F2-BF5D-C1722C3DBFFD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:31.5.3:*:*:*:*:*:*:*", + "matchCriteriaId": "60521E93-3495-40F7-AA72-EE531F8FA09D" }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.1:*:*:*:*:*:*:*", "matchCriteriaId": "6D7AAC77-57A3-4747-B760-0EE3CD53E4DE" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.1.0:*:*:*:*:*:*:*", - "matchCriteriaId": "19837144-FBCC-4B36-BAF4-FCD9F9C2AAE5" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.1.1:*:*:*:*:*:*:*", - "matchCriteriaId": "D0DB1BAA-3729-48BD-A8D0-5BBF3D4ABDE6" - }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.2:*:*:*:*:*:*:*", @@ -123,11 +138,6 @@ "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.3:*:*:*:*:*:*:*", "matchCriteriaId": "697EA344-F982-4E9F-9EC8-CCCB5829582B" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.3.0:*:*:*:*:*:*:*", - "matchCriteriaId": "5C699284-7876-4C8D-B259-B97C60C9A349" - }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.4:*:*:*:*:*:*:*", @@ -143,16 +153,6 @@ "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "4C9244A7-665A-48DE-89C9-C76E7A4556F5" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.5.2:*:*:*:*:*:*:*", - "matchCriteriaId": "2E6787E1-0523-49B7-B9B3-74F2D43DB714" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.5.3:*:*:*:*:*:*:*", - "matchCriteriaId": "AA842900-6ABD-4493-A5FF-C8840B081190" - }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.6.0:*:*:*:*:*:*:*", diff --git a/CVE-2015/CVE-2015-27xx/CVE-2015-2737.json b/CVE-2015/CVE-2015-27xx/CVE-2015-2737.json index c8af6418c27..57c213c8979 100644 --- a/CVE-2015/CVE-2015-27xx/CVE-2015-2737.json +++ b/CVE-2015/CVE-2015-27xx/CVE-2015-2737.json @@ -2,7 +2,7 @@ "id": "CVE-2015-2737", "sourceIdentifier": "security@mozilla.org", "published": "2015-07-06T02:01:06.220", - "lastModified": "2018-10-30T16:27:37.717", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -63,24 +63,39 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.0:*:*:*:*:*:*:*", - "matchCriteriaId": "992DDB6B-F32C-4E80-B386-EB1643D079E4" + "criteria": "cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*", + "matchCriteriaId": "C11F024A-A8B7-405B-8A13-4BF406FBDB22" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "D81A3698-797C-4CD9-BB02-A9182E0A6E11" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:31.1.1:*:*:*:*:*:*:*", + "matchCriteriaId": "84E8D7C7-B578-4623-9EA2-D13965DBE1F3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:31.3.0:*:*:*:*:*:*:*", + "matchCriteriaId": "C3E5D043-71F8-4A61-BEA4-176153E26FD6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:31.5.2:*:*:*:*:*:*:*", + "matchCriteriaId": "902BF23B-C1B9-41F2-BF5D-C1722C3DBFFD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:31.5.3:*:*:*:*:*:*:*", + "matchCriteriaId": "60521E93-3495-40F7-AA72-EE531F8FA09D" }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.1:*:*:*:*:*:*:*", "matchCriteriaId": "6D7AAC77-57A3-4747-B760-0EE3CD53E4DE" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.1.0:*:*:*:*:*:*:*", - "matchCriteriaId": "19837144-FBCC-4B36-BAF4-FCD9F9C2AAE5" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.1.1:*:*:*:*:*:*:*", - "matchCriteriaId": "D0DB1BAA-3729-48BD-A8D0-5BBF3D4ABDE6" - }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.2:*:*:*:*:*:*:*", @@ -91,11 +106,6 @@ "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.3:*:*:*:*:*:*:*", "matchCriteriaId": "697EA344-F982-4E9F-9EC8-CCCB5829582B" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.3.0:*:*:*:*:*:*:*", - "matchCriteriaId": "5C699284-7876-4C8D-B259-B97C60C9A349" - }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.4:*:*:*:*:*:*:*", @@ -111,16 +121,6 @@ "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "4C9244A7-665A-48DE-89C9-C76E7A4556F5" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.5.2:*:*:*:*:*:*:*", - "matchCriteriaId": "2E6787E1-0523-49B7-B9B3-74F2D43DB714" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.5.3:*:*:*:*:*:*:*", - "matchCriteriaId": "AA842900-6ABD-4493-A5FF-C8840B081190" - }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.6.0:*:*:*:*:*:*:*", diff --git a/CVE-2015/CVE-2015-27xx/CVE-2015-2738.json b/CVE-2015/CVE-2015-27xx/CVE-2015-2738.json index 646f6486d3f..ff89bdf5ea2 100644 --- a/CVE-2015/CVE-2015-27xx/CVE-2015-2738.json +++ b/CVE-2015/CVE-2015-27xx/CVE-2015-2738.json @@ -2,7 +2,7 @@ "id": "CVE-2015-2738", "sourceIdentifier": "security@mozilla.org", "published": "2015-07-06T02:01:07.077", - "lastModified": "2018-10-30T16:27:37.717", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -159,24 +159,39 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.0:*:*:*:*:*:*:*", - "matchCriteriaId": "992DDB6B-F32C-4E80-B386-EB1643D079E4" + "criteria": "cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*", + "matchCriteriaId": "C11F024A-A8B7-405B-8A13-4BF406FBDB22" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "D81A3698-797C-4CD9-BB02-A9182E0A6E11" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:31.1.1:*:*:*:*:*:*:*", + "matchCriteriaId": "84E8D7C7-B578-4623-9EA2-D13965DBE1F3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:31.3.0:*:*:*:*:*:*:*", + "matchCriteriaId": "C3E5D043-71F8-4A61-BEA4-176153E26FD6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:31.5.2:*:*:*:*:*:*:*", + "matchCriteriaId": "902BF23B-C1B9-41F2-BF5D-C1722C3DBFFD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:31.5.3:*:*:*:*:*:*:*", + "matchCriteriaId": "60521E93-3495-40F7-AA72-EE531F8FA09D" }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.1:*:*:*:*:*:*:*", "matchCriteriaId": "6D7AAC77-57A3-4747-B760-0EE3CD53E4DE" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.1.0:*:*:*:*:*:*:*", - "matchCriteriaId": "19837144-FBCC-4B36-BAF4-FCD9F9C2AAE5" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.1.1:*:*:*:*:*:*:*", - "matchCriteriaId": "D0DB1BAA-3729-48BD-A8D0-5BBF3D4ABDE6" - }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.2:*:*:*:*:*:*:*", @@ -187,11 +202,6 @@ "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.3:*:*:*:*:*:*:*", "matchCriteriaId": "697EA344-F982-4E9F-9EC8-CCCB5829582B" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.3.0:*:*:*:*:*:*:*", - "matchCriteriaId": "5C699284-7876-4C8D-B259-B97C60C9A349" - }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.4:*:*:*:*:*:*:*", @@ -207,16 +217,6 @@ "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "4C9244A7-665A-48DE-89C9-C76E7A4556F5" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.5.2:*:*:*:*:*:*:*", - "matchCriteriaId": "2E6787E1-0523-49B7-B9B3-74F2D43DB714" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.5.3:*:*:*:*:*:*:*", - "matchCriteriaId": "AA842900-6ABD-4493-A5FF-C8840B081190" - }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.6.0:*:*:*:*:*:*:*", diff --git a/CVE-2015/CVE-2015-27xx/CVE-2015-2739.json b/CVE-2015/CVE-2015-27xx/CVE-2015-2739.json index f19d9489881..6592b64caf6 100644 --- a/CVE-2015/CVE-2015-27xx/CVE-2015-2739.json +++ b/CVE-2015/CVE-2015-27xx/CVE-2015-2739.json @@ -2,7 +2,7 @@ "id": "CVE-2015-2739", "sourceIdentifier": "security@mozilla.org", "published": "2015-07-06T02:01:07.937", - "lastModified": "2023-09-12T14:55:31.563", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -149,24 +149,39 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.0:*:*:*:*:*:*:*", - "matchCriteriaId": "992DDB6B-F32C-4E80-B386-EB1643D079E4" + "criteria": "cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*", + "matchCriteriaId": "C11F024A-A8B7-405B-8A13-4BF406FBDB22" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "D81A3698-797C-4CD9-BB02-A9182E0A6E11" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:31.1.1:*:*:*:*:*:*:*", + "matchCriteriaId": "84E8D7C7-B578-4623-9EA2-D13965DBE1F3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:31.3.0:*:*:*:*:*:*:*", + "matchCriteriaId": "C3E5D043-71F8-4A61-BEA4-176153E26FD6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:31.5.2:*:*:*:*:*:*:*", + "matchCriteriaId": "902BF23B-C1B9-41F2-BF5D-C1722C3DBFFD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:31.5.3:*:*:*:*:*:*:*", + "matchCriteriaId": "60521E93-3495-40F7-AA72-EE531F8FA09D" }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.1:*:*:*:*:*:*:*", "matchCriteriaId": "6D7AAC77-57A3-4747-B760-0EE3CD53E4DE" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.1.0:*:*:*:*:*:*:*", - "matchCriteriaId": "19837144-FBCC-4B36-BAF4-FCD9F9C2AAE5" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.1.1:*:*:*:*:*:*:*", - "matchCriteriaId": "D0DB1BAA-3729-48BD-A8D0-5BBF3D4ABDE6" - }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.2:*:*:*:*:*:*:*", @@ -177,11 +192,6 @@ "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.3:*:*:*:*:*:*:*", "matchCriteriaId": "697EA344-F982-4E9F-9EC8-CCCB5829582B" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.3.0:*:*:*:*:*:*:*", - "matchCriteriaId": "5C699284-7876-4C8D-B259-B97C60C9A349" - }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.4:*:*:*:*:*:*:*", @@ -197,16 +207,6 @@ "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "4C9244A7-665A-48DE-89C9-C76E7A4556F5" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.5.2:*:*:*:*:*:*:*", - "matchCriteriaId": "2E6787E1-0523-49B7-B9B3-74F2D43DB714" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.5.3:*:*:*:*:*:*:*", - "matchCriteriaId": "AA842900-6ABD-4493-A5FF-C8840B081190" - }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.6.0:*:*:*:*:*:*:*", diff --git a/CVE-2015/CVE-2015-27xx/CVE-2015-2740.json b/CVE-2015/CVE-2015-27xx/CVE-2015-2740.json index c9fe2f039bf..deef8ef71b0 100644 --- a/CVE-2015/CVE-2015-27xx/CVE-2015-2740.json +++ b/CVE-2015/CVE-2015-27xx/CVE-2015-2740.json @@ -2,7 +2,7 @@ "id": "CVE-2015-2740", "sourceIdentifier": "security@mozilla.org", "published": "2015-07-06T02:01:08.703", - "lastModified": "2023-09-12T14:55:31.563", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -79,24 +79,39 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.0:*:*:*:*:*:*:*", - "matchCriteriaId": "992DDB6B-F32C-4E80-B386-EB1643D079E4" + "criteria": "cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*", + "matchCriteriaId": "C11F024A-A8B7-405B-8A13-4BF406FBDB22" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "D81A3698-797C-4CD9-BB02-A9182E0A6E11" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:31.1.1:*:*:*:*:*:*:*", + "matchCriteriaId": "84E8D7C7-B578-4623-9EA2-D13965DBE1F3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:31.3.0:*:*:*:*:*:*:*", + "matchCriteriaId": "C3E5D043-71F8-4A61-BEA4-176153E26FD6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:31.5.2:*:*:*:*:*:*:*", + "matchCriteriaId": "902BF23B-C1B9-41F2-BF5D-C1722C3DBFFD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:31.5.3:*:*:*:*:*:*:*", + "matchCriteriaId": "60521E93-3495-40F7-AA72-EE531F8FA09D" }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.1:*:*:*:*:*:*:*", "matchCriteriaId": "6D7AAC77-57A3-4747-B760-0EE3CD53E4DE" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.1.0:*:*:*:*:*:*:*", - "matchCriteriaId": "19837144-FBCC-4B36-BAF4-FCD9F9C2AAE5" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.1.1:*:*:*:*:*:*:*", - "matchCriteriaId": "D0DB1BAA-3729-48BD-A8D0-5BBF3D4ABDE6" - }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.2:*:*:*:*:*:*:*", @@ -107,11 +122,6 @@ "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.3:*:*:*:*:*:*:*", "matchCriteriaId": "697EA344-F982-4E9F-9EC8-CCCB5829582B" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.3.0:*:*:*:*:*:*:*", - "matchCriteriaId": "5C699284-7876-4C8D-B259-B97C60C9A349" - }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.4:*:*:*:*:*:*:*", @@ -127,16 +137,6 @@ "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "4C9244A7-665A-48DE-89C9-C76E7A4556F5" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.5.2:*:*:*:*:*:*:*", - "matchCriteriaId": "2E6787E1-0523-49B7-B9B3-74F2D43DB714" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.5.3:*:*:*:*:*:*:*", - "matchCriteriaId": "AA842900-6ABD-4493-A5FF-C8840B081190" - }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.6.0:*:*:*:*:*:*:*", diff --git a/CVE-2015/CVE-2015-27xx/CVE-2015-2741.json b/CVE-2015/CVE-2015-27xx/CVE-2015-2741.json index 38abcfa065d..cfe72e261fa 100644 --- a/CVE-2015/CVE-2015-27xx/CVE-2015-2741.json +++ b/CVE-2015/CVE-2015-27xx/CVE-2015-2741.json @@ -2,7 +2,7 @@ "id": "CVE-2015-2741", "sourceIdentifier": "security@mozilla.org", "published": "2015-07-06T02:01:09.517", - "lastModified": "2016-12-28T02:59:09.887", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -94,24 +94,39 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.0:*:*:*:*:*:*:*", - "matchCriteriaId": "992DDB6B-F32C-4E80-B386-EB1643D079E4" + "criteria": "cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*", + "matchCriteriaId": "C11F024A-A8B7-405B-8A13-4BF406FBDB22" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "D81A3698-797C-4CD9-BB02-A9182E0A6E11" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:31.1.1:*:*:*:*:*:*:*", + "matchCriteriaId": "84E8D7C7-B578-4623-9EA2-D13965DBE1F3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:31.3.0:*:*:*:*:*:*:*", + "matchCriteriaId": "C3E5D043-71F8-4A61-BEA4-176153E26FD6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:31.5.2:*:*:*:*:*:*:*", + "matchCriteriaId": "902BF23B-C1B9-41F2-BF5D-C1722C3DBFFD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:31.5.3:*:*:*:*:*:*:*", + "matchCriteriaId": "60521E93-3495-40F7-AA72-EE531F8FA09D" }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.1:*:*:*:*:*:*:*", "matchCriteriaId": "6D7AAC77-57A3-4747-B760-0EE3CD53E4DE" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.1.0:*:*:*:*:*:*:*", - "matchCriteriaId": "19837144-FBCC-4B36-BAF4-FCD9F9C2AAE5" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.1.1:*:*:*:*:*:*:*", - "matchCriteriaId": "D0DB1BAA-3729-48BD-A8D0-5BBF3D4ABDE6" - }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.2:*:*:*:*:*:*:*", @@ -122,11 +137,6 @@ "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.3:*:*:*:*:*:*:*", "matchCriteriaId": "697EA344-F982-4E9F-9EC8-CCCB5829582B" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.3.0:*:*:*:*:*:*:*", - "matchCriteriaId": "5C699284-7876-4C8D-B259-B97C60C9A349" - }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.4:*:*:*:*:*:*:*", @@ -142,16 +152,6 @@ "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "4C9244A7-665A-48DE-89C9-C76E7A4556F5" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.5.2:*:*:*:*:*:*:*", - "matchCriteriaId": "2E6787E1-0523-49B7-B9B3-74F2D43DB714" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.5.3:*:*:*:*:*:*:*", - "matchCriteriaId": "AA842900-6ABD-4493-A5FF-C8840B081190" - }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.6.0:*:*:*:*:*:*:*", diff --git a/CVE-2015/CVE-2015-27xx/CVE-2015-2743.json b/CVE-2015/CVE-2015-27xx/CVE-2015-2743.json index 2a6afc664b3..05fd7485016 100644 --- a/CVE-2015/CVE-2015-27xx/CVE-2015-2743.json +++ b/CVE-2015/CVE-2015-27xx/CVE-2015-2743.json @@ -2,7 +2,7 @@ "id": "CVE-2015-2743", "sourceIdentifier": "security@mozilla.org", "published": "2015-07-06T02:01:11.780", - "lastModified": "2023-09-12T14:55:31.563", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -63,24 +63,39 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.0:*:*:*:*:*:*:*", - "matchCriteriaId": "992DDB6B-F32C-4E80-B386-EB1643D079E4" + "criteria": "cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*", + "matchCriteriaId": "C11F024A-A8B7-405B-8A13-4BF406FBDB22" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "D81A3698-797C-4CD9-BB02-A9182E0A6E11" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:31.1.1:*:*:*:*:*:*:*", + "matchCriteriaId": "84E8D7C7-B578-4623-9EA2-D13965DBE1F3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:31.3.0:*:*:*:*:*:*:*", + "matchCriteriaId": "C3E5D043-71F8-4A61-BEA4-176153E26FD6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:31.5.2:*:*:*:*:*:*:*", + "matchCriteriaId": "902BF23B-C1B9-41F2-BF5D-C1722C3DBFFD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:31.5.3:*:*:*:*:*:*:*", + "matchCriteriaId": "60521E93-3495-40F7-AA72-EE531F8FA09D" }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.1:*:*:*:*:*:*:*", "matchCriteriaId": "6D7AAC77-57A3-4747-B760-0EE3CD53E4DE" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.1.0:*:*:*:*:*:*:*", - "matchCriteriaId": "19837144-FBCC-4B36-BAF4-FCD9F9C2AAE5" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.1.1:*:*:*:*:*:*:*", - "matchCriteriaId": "D0DB1BAA-3729-48BD-A8D0-5BBF3D4ABDE6" - }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.2:*:*:*:*:*:*:*", @@ -91,11 +106,6 @@ "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.3:*:*:*:*:*:*:*", "matchCriteriaId": "697EA344-F982-4E9F-9EC8-CCCB5829582B" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.3.0:*:*:*:*:*:*:*", - "matchCriteriaId": "5C699284-7876-4C8D-B259-B97C60C9A349" - }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.4:*:*:*:*:*:*:*", @@ -111,16 +121,6 @@ "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "4C9244A7-665A-48DE-89C9-C76E7A4556F5" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.5.2:*:*:*:*:*:*:*", - "matchCriteriaId": "2E6787E1-0523-49B7-B9B3-74F2D43DB714" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.5.3:*:*:*:*:*:*:*", - "matchCriteriaId": "AA842900-6ABD-4493-A5FF-C8840B081190" - }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:31.6.0:*:*:*:*:*:*:*", diff --git a/CVE-2015/CVE-2015-75xx/CVE-2015-7575.json b/CVE-2015/CVE-2015-75xx/CVE-2015-7575.json index 84faed71ceb..49ccf467c8c 100644 --- a/CVE-2015/CVE-2015-75xx/CVE-2015-7575.json +++ b/CVE-2015/CVE-2015-75xx/CVE-2015-7575.json @@ -2,7 +2,7 @@ "id": "CVE-2015-7575", "sourceIdentifier": "secalert@redhat.com", "published": "2016-01-09T02:59:10.910", - "lastModified": "2018-10-30T16:27:35.843", + "lastModified": "2024-10-21T13:11:23.977", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -124,6 +124,16 @@ "operator": "OR", "negate": false, "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:38.5.0:*:*:*:*:*:*:*", + "matchCriteriaId": "62B4E871-0ACB-4EC5-8392-EAD0DF25E64B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:38.5.1:*:*:*:*:*:*:*", + "matchCriteriaId": "435D6EF5-C879-4121-9D47-EF2236E53409" + }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.0:*:*:*:*:*:*:*", @@ -168,16 +178,6 @@ "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "B1F6A91A-4C19-47FB-B538-2B1837F68C61" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.5.0:*:*:*:*:*:*:*", - "matchCriteriaId": "4773E493-5198-48FD-97D3-C20C36DF76E1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.5.1:*:*:*:*:*:*:*", - "matchCriteriaId": "4E8F7CC3-9108-49C5-A0EE-DCC86A949C74" } ] } diff --git a/CVE-2016/CVE-2016-101xx/CVE-2016-10196.json b/CVE-2016/CVE-2016-101xx/CVE-2016-10196.json index 02283457da8..a3df1f38c6d 100644 --- a/CVE-2016/CVE-2016-101xx/CVE-2016-10196.json +++ b/CVE-2016/CVE-2016-101xx/CVE-2016-10196.json @@ -2,7 +2,7 @@ "id": "CVE-2016-10196", "sourceIdentifier": "cve@mitre.org", "published": "2017-03-15T15:59:00.437", - "lastModified": "2022-01-31T17:38:26.500", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -122,14 +122,14 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", - "versionEndExcluding": "45.9.0", - "matchCriteriaId": "58F03A98-1317-4A15-BAB3-AC045AA9AAE9" + "criteria": "cpe:2.3:a:mozilla:firefox:52.0:*:*:*:*:*:*:*", + "matchCriteriaId": "1C00F05B-5B10-401D-8C5E-517FAF7BCFE4" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:52.0:*:*:*:*:*:*:*", - "matchCriteriaId": "6AC0200B-0E23-446D-97FF-33341B55B886" + "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", + "versionEndExcluding": "45.9.0", + "matchCriteriaId": "58F03A98-1317-4A15-BAB3-AC045AA9AAE9" }, { "vulnerable": true, diff --git a/CVE-2016/CVE-2016-15xx/CVE-2016-1521.json b/CVE-2016/CVE-2016-15xx/CVE-2016-1521.json index 6d65b7c0bca..2916cb521f0 100644 --- a/CVE-2016/CVE-2016-15xx/CVE-2016-1521.json +++ b/CVE-2016/CVE-2016-15xx/CVE-2016-1521.json @@ -2,7 +2,7 @@ "id": "CVE-2016-1521", "sourceIdentifier": "cret@cert.org", "published": "2016-02-13T02:59:06.883", - "lastModified": "2017-07-01T01:29:33.827", + "lastModified": "2024-10-21T13:11:23.977", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -125,6 +125,26 @@ "versionEndIncluding": "42.0", "matchCriteriaId": "735317AD-14B8-4A73-B5B0-6A4C84FC202E" }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:38.5.0:*:*:*:*:*:*:*", + "matchCriteriaId": "62B4E871-0ACB-4EC5-8392-EAD0DF25E64B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:38.5.1:*:*:*:*:*:*:*", + "matchCriteriaId": "435D6EF5-C879-4121-9D47-EF2236E53409" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:38.5.2:*:*:*:*:*:*:*", + "matchCriteriaId": "5F99233D-55EE-474D-9D8A-872D5FD9F3DE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:38.6.0:*:*:*:*:*:*:*", + "matchCriteriaId": "A5963D11-D2F4-40A7-81CE-E034C91FCCBD" + }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.0.1:*:*:*:*:*:*:*", @@ -164,26 +184,6 @@ "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "B1F6A91A-4C19-47FB-B538-2B1837F68C61" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.5.0:*:*:*:*:*:*:*", - "matchCriteriaId": "4773E493-5198-48FD-97D3-C20C36DF76E1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.5.1:*:*:*:*:*:*:*", - "matchCriteriaId": "4E8F7CC3-9108-49C5-A0EE-DCC86A949C74" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.5.2:*:*:*:*:*:*:*", - "matchCriteriaId": "5189097F-65FA-4F24-89BB-2996A605C9AB" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.6.0:*:*:*:*:*:*:*", - "matchCriteriaId": "97CD0D0C-B3AB-47B2-90DB-D559BFCFC670" } ] } diff --git a/CVE-2016/CVE-2016-15xx/CVE-2016-1522.json b/CVE-2016/CVE-2016-15xx/CVE-2016-1522.json index 0a3b57e2599..1e29a267981 100644 --- a/CVE-2016/CVE-2016-15xx/CVE-2016-1522.json +++ b/CVE-2016/CVE-2016-15xx/CVE-2016-1522.json @@ -2,7 +2,7 @@ "id": "CVE-2016-1522", "sourceIdentifier": "cret@cert.org", "published": "2016-02-13T02:59:07.930", - "lastModified": "2017-07-01T01:29:33.907", + "lastModified": "2024-10-21T13:11:23.977", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -103,6 +103,26 @@ "operator": "OR", "negate": false, "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:38.5.0:*:*:*:*:*:*:*", + "matchCriteriaId": "62B4E871-0ACB-4EC5-8392-EAD0DF25E64B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:38.5.1:*:*:*:*:*:*:*", + "matchCriteriaId": "435D6EF5-C879-4121-9D47-EF2236E53409" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:38.5.2:*:*:*:*:*:*:*", + "matchCriteriaId": "5F99233D-55EE-474D-9D8A-872D5FD9F3DE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:38.6.0:*:*:*:*:*:*:*", + "matchCriteriaId": "A5963D11-D2F4-40A7-81CE-E034C91FCCBD" + }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.0:*:*:*:*:*:*:*", @@ -148,26 +168,6 @@ "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "B1F6A91A-4C19-47FB-B538-2B1837F68C61" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.5.0:*:*:*:*:*:*:*", - "matchCriteriaId": "4773E493-5198-48FD-97D3-C20C36DF76E1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.5.1:*:*:*:*:*:*:*", - "matchCriteriaId": "4E8F7CC3-9108-49C5-A0EE-DCC86A949C74" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.5.2:*:*:*:*:*:*:*", - "matchCriteriaId": "5189097F-65FA-4F24-89BB-2996A605C9AB" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.6.0:*:*:*:*:*:*:*", - "matchCriteriaId": "97CD0D0C-B3AB-47B2-90DB-D559BFCFC670" - }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", diff --git a/CVE-2016/CVE-2016-15xx/CVE-2016-1523.json b/CVE-2016/CVE-2016-15xx/CVE-2016-1523.json index c0d701d66b6..db10b251120 100644 --- a/CVE-2016/CVE-2016-15xx/CVE-2016-1523.json +++ b/CVE-2016/CVE-2016-15xx/CVE-2016-1523.json @@ -2,7 +2,7 @@ "id": "CVE-2016-1523", "sourceIdentifier": "cret@cert.org", "published": "2016-02-13T02:59:08.900", - "lastModified": "2017-07-01T01:29:33.967", + "lastModified": "2024-10-21T13:11:23.977", "vulnStatus": "Modified", "cveTags": [], "evaluatorComment": "CWE-476: NULL Pointer Dereference", @@ -104,6 +104,26 @@ "operator": "OR", "negate": false, "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:38.5.0:*:*:*:*:*:*:*", + "matchCriteriaId": "62B4E871-0ACB-4EC5-8392-EAD0DF25E64B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:38.5.1:*:*:*:*:*:*:*", + "matchCriteriaId": "435D6EF5-C879-4121-9D47-EF2236E53409" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:38.5.2:*:*:*:*:*:*:*", + "matchCriteriaId": "5F99233D-55EE-474D-9D8A-872D5FD9F3DE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:38.6.0:*:*:*:*:*:*:*", + "matchCriteriaId": "A5963D11-D2F4-40A7-81CE-E034C91FCCBD" + }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.0:*:*:*:*:*:*:*", @@ -149,26 +169,6 @@ "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "B1F6A91A-4C19-47FB-B538-2B1837F68C61" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.5.0:*:*:*:*:*:*:*", - "matchCriteriaId": "4773E493-5198-48FD-97D3-C20C36DF76E1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.5.1:*:*:*:*:*:*:*", - "matchCriteriaId": "4E8F7CC3-9108-49C5-A0EE-DCC86A949C74" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.5.2:*:*:*:*:*:*:*", - "matchCriteriaId": "5189097F-65FA-4F24-89BB-2996A605C9AB" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.6.0:*:*:*:*:*:*:*", - "matchCriteriaId": "97CD0D0C-B3AB-47B2-90DB-D559BFCFC670" - }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", diff --git a/CVE-2016/CVE-2016-15xx/CVE-2016-1526.json b/CVE-2016/CVE-2016-15xx/CVE-2016-1526.json index 0fad249165d..f17213ae0ea 100644 --- a/CVE-2016/CVE-2016-15xx/CVE-2016-1526.json +++ b/CVE-2016/CVE-2016-15xx/CVE-2016-1526.json @@ -2,7 +2,7 @@ "id": "CVE-2016-1526", "sourceIdentifier": "cret@cert.org", "published": "2016-02-13T02:59:12.027", - "lastModified": "2018-01-05T02:30:33.900", + "lastModified": "2024-10-21T13:11:23.977", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -107,6 +107,26 @@ "operator": "OR", "negate": false, "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:38.5.0:*:*:*:*:*:*:*", + "matchCriteriaId": "62B4E871-0ACB-4EC5-8392-EAD0DF25E64B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:38.5.1:*:*:*:*:*:*:*", + "matchCriteriaId": "435D6EF5-C879-4121-9D47-EF2236E53409" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:38.5.2:*:*:*:*:*:*:*", + "matchCriteriaId": "5F99233D-55EE-474D-9D8A-872D5FD9F3DE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:38.6.0:*:*:*:*:*:*:*", + "matchCriteriaId": "A5963D11-D2F4-40A7-81CE-E034C91FCCBD" + }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.0:*:*:*:*:*:*:*", @@ -152,26 +172,6 @@ "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "B1F6A91A-4C19-47FB-B538-2B1837F68C61" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.5.0:*:*:*:*:*:*:*", - "matchCriteriaId": "4773E493-5198-48FD-97D3-C20C36DF76E1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.5.1:*:*:*:*:*:*:*", - "matchCriteriaId": "4E8F7CC3-9108-49C5-A0EE-DCC86A949C74" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.5.2:*:*:*:*:*:*:*", - "matchCriteriaId": "5189097F-65FA-4F24-89BB-2996A605C9AB" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.6.0:*:*:*:*:*:*:*", - "matchCriteriaId": "97CD0D0C-B3AB-47B2-90DB-D559BFCFC670" - }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", diff --git a/CVE-2016/CVE-2016-19xx/CVE-2016-1930.json b/CVE-2016/CVE-2016-19xx/CVE-2016-1930.json index b16d05c9938..72646bb33c1 100644 --- a/CVE-2016/CVE-2016-19xx/CVE-2016-1930.json +++ b/CVE-2016/CVE-2016-19xx/CVE-2016-1930.json @@ -2,7 +2,7 @@ "id": "CVE-2016-1930", "sourceIdentifier": "security@mozilla.org", "published": "2016-01-31T18:59:00.137", - "lastModified": "2019-12-27T16:08:55.810", + "lastModified": "2024-10-21T13:11:23.977", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -124,6 +124,11 @@ "operator": "OR", "negate": false, "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:38.5.0:*:*:*:*:*:*:*", + "matchCriteriaId": "62B4E871-0ACB-4EC5-8392-EAD0DF25E64B" + }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.0:*:*:*:*:*:*:*", @@ -148,11 +153,6 @@ "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "B1F6A91A-4C19-47FB-B538-2B1837F68C61" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.5.0:*:*:*:*:*:*:*", - "matchCriteriaId": "4773E493-5198-48FD-97D3-C20C36DF76E1" } ] } diff --git a/CVE-2016/CVE-2016-19xx/CVE-2016-1935.json b/CVE-2016/CVE-2016-19xx/CVE-2016-1935.json index 93c53469f69..b3e483a8587 100644 --- a/CVE-2016/CVE-2016-19xx/CVE-2016-1935.json +++ b/CVE-2016/CVE-2016-19xx/CVE-2016-1935.json @@ -2,7 +2,7 @@ "id": "CVE-2016-1935", "sourceIdentifier": "security@mozilla.org", "published": "2016-01-31T18:59:03.137", - "lastModified": "2019-12-27T16:08:55.810", + "lastModified": "2024-10-21T13:11:23.977", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -149,6 +149,11 @@ "operator": "OR", "negate": false, "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:38.5.0:*:*:*:*:*:*:*", + "matchCriteriaId": "62B4E871-0ACB-4EC5-8392-EAD0DF25E64B" + }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.0:*:*:*:*:*:*:*", @@ -173,11 +178,6 @@ "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "B1F6A91A-4C19-47FB-B538-2B1837F68C61" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.5.0:*:*:*:*:*:*:*", - "matchCriteriaId": "4773E493-5198-48FD-97D3-C20C36DF76E1" } ] } diff --git a/CVE-2016/CVE-2016-19xx/CVE-2016-1950.json b/CVE-2016/CVE-2016-19xx/CVE-2016-1950.json index b998e1f06f2..9e4bb982af9 100644 --- a/CVE-2016/CVE-2016-19xx/CVE-2016-1950.json +++ b/CVE-2016/CVE-2016-19xx/CVE-2016-1950.json @@ -2,7 +2,7 @@ "id": "CVE-2016-1950", "sourceIdentifier": "security@mozilla.org", "published": "2016-03-13T18:59:00.193", - "lastModified": "2019-12-27T16:08:55.810", + "lastModified": "2024-10-21T13:11:23.977", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -116,6 +116,26 @@ "versionEndIncluding": "44.0.2", "matchCriteriaId": "A2CA2CAD-3088-47C2-AE3A-607E6064E9BE" }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:38.5.0:*:*:*:*:*:*:*", + "matchCriteriaId": "62B4E871-0ACB-4EC5-8392-EAD0DF25E64B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:38.5.1:*:*:*:*:*:*:*", + "matchCriteriaId": "435D6EF5-C879-4121-9D47-EF2236E53409" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:38.6.0:*:*:*:*:*:*:*", + "matchCriteriaId": "A5963D11-D2F4-40A7-81CE-E034C91FCCBD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:38.6.1:*:*:*:*:*:*:*", + "matchCriteriaId": "5FB022A7-B792-4AC0-B2CF-AF6F384AE719" + }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.0:*:*:*:*:*:*:*", @@ -160,26 +180,6 @@ "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "B1F6A91A-4C19-47FB-B538-2B1837F68C61" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.5.0:*:*:*:*:*:*:*", - "matchCriteriaId": "4773E493-5198-48FD-97D3-C20C36DF76E1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.5.1:*:*:*:*:*:*:*", - "matchCriteriaId": "4E8F7CC3-9108-49C5-A0EE-DCC86A949C74" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.6.0:*:*:*:*:*:*:*", - "matchCriteriaId": "97CD0D0C-B3AB-47B2-90DB-D559BFCFC670" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.6.1:*:*:*:*:*:*:*", - "matchCriteriaId": "E8A6B04A-AA56-43F4-835A-86795055A869" } ] } diff --git a/CVE-2016/CVE-2016-19xx/CVE-2016-1952.json b/CVE-2016/CVE-2016-19xx/CVE-2016-1952.json index 025073b6f53..44e40e9c460 100644 --- a/CVE-2016/CVE-2016-19xx/CVE-2016-1952.json +++ b/CVE-2016/CVE-2016-19xx/CVE-2016-1952.json @@ -2,7 +2,7 @@ "id": "CVE-2016-1952", "sourceIdentifier": "security@mozilla.org", "published": "2016-03-13T18:59:01.317", - "lastModified": "2019-12-27T16:08:55.810", + "lastModified": "2024-10-21T13:11:23.977", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -144,6 +144,26 @@ "versionEndIncluding": "44.0.2", "matchCriteriaId": "A2CA2CAD-3088-47C2-AE3A-607E6064E9BE" }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:38.5.0:*:*:*:*:*:*:*", + "matchCriteriaId": "62B4E871-0ACB-4EC5-8392-EAD0DF25E64B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:38.5.1:*:*:*:*:*:*:*", + "matchCriteriaId": "435D6EF5-C879-4121-9D47-EF2236E53409" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:38.6.0:*:*:*:*:*:*:*", + "matchCriteriaId": "A5963D11-D2F4-40A7-81CE-E034C91FCCBD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:38.6.1:*:*:*:*:*:*:*", + "matchCriteriaId": "5FB022A7-B792-4AC0-B2CF-AF6F384AE719" + }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.0:*:*:*:*:*:*:*", @@ -189,26 +209,6 @@ "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "B1F6A91A-4C19-47FB-B538-2B1837F68C61" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.5.0:*:*:*:*:*:*:*", - "matchCriteriaId": "4773E493-5198-48FD-97D3-C20C36DF76E1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.5.1:*:*:*:*:*:*:*", - "matchCriteriaId": "4E8F7CC3-9108-49C5-A0EE-DCC86A949C74" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.6.0:*:*:*:*:*:*:*", - "matchCriteriaId": "97CD0D0C-B3AB-47B2-90DB-D559BFCFC670" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.6.1:*:*:*:*:*:*:*", - "matchCriteriaId": "E8A6B04A-AA56-43F4-835A-86795055A869" - }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", diff --git a/CVE-2016/CVE-2016-19xx/CVE-2016-1953.json b/CVE-2016/CVE-2016-19xx/CVE-2016-1953.json index ed97a001b86..40d32bc1733 100644 --- a/CVE-2016/CVE-2016-19xx/CVE-2016-1953.json +++ b/CVE-2016/CVE-2016-19xx/CVE-2016-1953.json @@ -2,7 +2,7 @@ "id": "CVE-2016-1953", "sourceIdentifier": "security@mozilla.org", "published": "2016-03-13T18:59:02.490", - "lastModified": "2018-10-30T16:27:35.843", + "lastModified": "2024-10-21T13:11:23.977", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -89,6 +89,26 @@ "versionEndIncluding": "44.0.2", "matchCriteriaId": "A2CA2CAD-3088-47C2-AE3A-607E6064E9BE" }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:38.5.0:*:*:*:*:*:*:*", + "matchCriteriaId": "62B4E871-0ACB-4EC5-8392-EAD0DF25E64B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:38.5.1:*:*:*:*:*:*:*", + "matchCriteriaId": "435D6EF5-C879-4121-9D47-EF2236E53409" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:38.6.0:*:*:*:*:*:*:*", + "matchCriteriaId": "A5963D11-D2F4-40A7-81CE-E034C91FCCBD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:38.6.1:*:*:*:*:*:*:*", + "matchCriteriaId": "5FB022A7-B792-4AC0-B2CF-AF6F384AE719" + }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.0:*:*:*:*:*:*:*", @@ -134,26 +154,6 @@ "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "B1F6A91A-4C19-47FB-B538-2B1837F68C61" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.5.0:*:*:*:*:*:*:*", - "matchCriteriaId": "4773E493-5198-48FD-97D3-C20C36DF76E1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.5.1:*:*:*:*:*:*:*", - "matchCriteriaId": "4E8F7CC3-9108-49C5-A0EE-DCC86A949C74" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.6.0:*:*:*:*:*:*:*", - "matchCriteriaId": "97CD0D0C-B3AB-47B2-90DB-D559BFCFC670" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.6.1:*:*:*:*:*:*:*", - "matchCriteriaId": "E8A6B04A-AA56-43F4-835A-86795055A869" - }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", diff --git a/CVE-2016/CVE-2016-19xx/CVE-2016-1954.json b/CVE-2016/CVE-2016-19xx/CVE-2016-1954.json index 48d2b99366c..adf8fd58dd3 100644 --- a/CVE-2016/CVE-2016-19xx/CVE-2016-1954.json +++ b/CVE-2016/CVE-2016-19xx/CVE-2016-1954.json @@ -2,7 +2,7 @@ "id": "CVE-2016-1954", "sourceIdentifier": "security@mozilla.org", "published": "2016-03-13T18:59:03.600", - "lastModified": "2019-12-27T16:08:55.810", + "lastModified": "2024-10-21T13:11:23.977", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -89,6 +89,26 @@ "versionEndIncluding": "44.0.2", "matchCriteriaId": "A2CA2CAD-3088-47C2-AE3A-607E6064E9BE" }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:38.5.0:*:*:*:*:*:*:*", + "matchCriteriaId": "62B4E871-0ACB-4EC5-8392-EAD0DF25E64B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:38.5.1:*:*:*:*:*:*:*", + "matchCriteriaId": "435D6EF5-C879-4121-9D47-EF2236E53409" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:38.6.0:*:*:*:*:*:*:*", + "matchCriteriaId": "A5963D11-D2F4-40A7-81CE-E034C91FCCBD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:38.6.1:*:*:*:*:*:*:*", + "matchCriteriaId": "5FB022A7-B792-4AC0-B2CF-AF6F384AE719" + }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.0:*:*:*:*:*:*:*", @@ -134,26 +154,6 @@ "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "B1F6A91A-4C19-47FB-B538-2B1837F68C61" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.5.0:*:*:*:*:*:*:*", - "matchCriteriaId": "4773E493-5198-48FD-97D3-C20C36DF76E1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.5.1:*:*:*:*:*:*:*", - "matchCriteriaId": "4E8F7CC3-9108-49C5-A0EE-DCC86A949C74" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.6.0:*:*:*:*:*:*:*", - "matchCriteriaId": "97CD0D0C-B3AB-47B2-90DB-D559BFCFC670" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.6.1:*:*:*:*:*:*:*", - "matchCriteriaId": "E8A6B04A-AA56-43F4-835A-86795055A869" - }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", diff --git a/CVE-2016/CVE-2016-19xx/CVE-2016-1957.json b/CVE-2016/CVE-2016-19xx/CVE-2016-1957.json index 30d1413b7e3..c174d5b7bc4 100644 --- a/CVE-2016/CVE-2016-19xx/CVE-2016-1957.json +++ b/CVE-2016/CVE-2016-19xx/CVE-2016-1957.json @@ -2,7 +2,7 @@ "id": "CVE-2016-1957", "sourceIdentifier": "security@mozilla.org", "published": "2016-03-13T18:59:06.817", - "lastModified": "2019-12-27T16:08:55.810", + "lastModified": "2024-10-21T13:11:23.977", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -119,6 +119,26 @@ "versionEndIncluding": "44.0.2", "matchCriteriaId": "A2CA2CAD-3088-47C2-AE3A-607E6064E9BE" }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:38.5.0:*:*:*:*:*:*:*", + "matchCriteriaId": "62B4E871-0ACB-4EC5-8392-EAD0DF25E64B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:38.5.1:*:*:*:*:*:*:*", + "matchCriteriaId": "435D6EF5-C879-4121-9D47-EF2236E53409" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:38.6.0:*:*:*:*:*:*:*", + "matchCriteriaId": "A5963D11-D2F4-40A7-81CE-E034C91FCCBD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:38.6.1:*:*:*:*:*:*:*", + "matchCriteriaId": "5FB022A7-B792-4AC0-B2CF-AF6F384AE719" + }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.0:*:*:*:*:*:*:*", @@ -164,26 +184,6 @@ "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "B1F6A91A-4C19-47FB-B538-2B1837F68C61" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.5.0:*:*:*:*:*:*:*", - "matchCriteriaId": "4773E493-5198-48FD-97D3-C20C36DF76E1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.5.1:*:*:*:*:*:*:*", - "matchCriteriaId": "4E8F7CC3-9108-49C5-A0EE-DCC86A949C74" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.6.0:*:*:*:*:*:*:*", - "matchCriteriaId": "97CD0D0C-B3AB-47B2-90DB-D559BFCFC670" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.6.1:*:*:*:*:*:*:*", - "matchCriteriaId": "E8A6B04A-AA56-43F4-835A-86795055A869" - }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", diff --git a/CVE-2016/CVE-2016-19xx/CVE-2016-1958.json b/CVE-2016/CVE-2016-19xx/CVE-2016-1958.json index 82980f03d4b..1aa3cca3eed 100644 --- a/CVE-2016/CVE-2016-19xx/CVE-2016-1958.json +++ b/CVE-2016/CVE-2016-19xx/CVE-2016-1958.json @@ -2,7 +2,7 @@ "id": "CVE-2016-1958", "sourceIdentifier": "security@mozilla.org", "published": "2016-03-13T18:59:07.677", - "lastModified": "2019-12-27T16:08:55.810", + "lastModified": "2024-10-21T13:11:23.977", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -129,6 +129,26 @@ "versionEndIncluding": "44.0.2", "matchCriteriaId": "A2CA2CAD-3088-47C2-AE3A-607E6064E9BE" }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:38.5.0:*:*:*:*:*:*:*", + "matchCriteriaId": "62B4E871-0ACB-4EC5-8392-EAD0DF25E64B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:38.5.1:*:*:*:*:*:*:*", + "matchCriteriaId": "435D6EF5-C879-4121-9D47-EF2236E53409" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:38.6.0:*:*:*:*:*:*:*", + "matchCriteriaId": "A5963D11-D2F4-40A7-81CE-E034C91FCCBD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:38.6.1:*:*:*:*:*:*:*", + "matchCriteriaId": "5FB022A7-B792-4AC0-B2CF-AF6F384AE719" + }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.0:*:*:*:*:*:*:*", @@ -173,26 +193,6 @@ "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "B1F6A91A-4C19-47FB-B538-2B1837F68C61" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.5.0:*:*:*:*:*:*:*", - "matchCriteriaId": "4773E493-5198-48FD-97D3-C20C36DF76E1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.5.1:*:*:*:*:*:*:*", - "matchCriteriaId": "4E8F7CC3-9108-49C5-A0EE-DCC86A949C74" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.6.0:*:*:*:*:*:*:*", - "matchCriteriaId": "97CD0D0C-B3AB-47B2-90DB-D559BFCFC670" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.6.1:*:*:*:*:*:*:*", - "matchCriteriaId": "E8A6B04A-AA56-43F4-835A-86795055A869" } ] } diff --git a/CVE-2016/CVE-2016-19xx/CVE-2016-1960.json b/CVE-2016/CVE-2016-19xx/CVE-2016-1960.json index 97df7083b38..b742ac1a102 100644 --- a/CVE-2016/CVE-2016-19xx/CVE-2016-1960.json +++ b/CVE-2016/CVE-2016-19xx/CVE-2016-1960.json @@ -2,7 +2,7 @@ "id": "CVE-2016-1960", "sourceIdentifier": "security@mozilla.org", "published": "2016-03-13T18:59:09.617", - "lastModified": "2019-12-27T16:08:55.810", + "lastModified": "2024-10-21T13:11:23.977", "vulnStatus": "Modified", "cveTags": [], "evaluatorComment": "CWE-416: Use After Free", @@ -115,6 +115,26 @@ "versionEndIncluding": "44.0.2", "matchCriteriaId": "A2CA2CAD-3088-47C2-AE3A-607E6064E9BE" }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:38.5.0:*:*:*:*:*:*:*", + "matchCriteriaId": "62B4E871-0ACB-4EC5-8392-EAD0DF25E64B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:38.5.1:*:*:*:*:*:*:*", + "matchCriteriaId": "435D6EF5-C879-4121-9D47-EF2236E53409" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:38.6.0:*:*:*:*:*:*:*", + "matchCriteriaId": "A5963D11-D2F4-40A7-81CE-E034C91FCCBD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:38.6.1:*:*:*:*:*:*:*", + "matchCriteriaId": "5FB022A7-B792-4AC0-B2CF-AF6F384AE719" + }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.0:*:*:*:*:*:*:*", @@ -160,26 +180,6 @@ "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "B1F6A91A-4C19-47FB-B538-2B1837F68C61" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.5.0:*:*:*:*:*:*:*", - "matchCriteriaId": "4773E493-5198-48FD-97D3-C20C36DF76E1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.5.1:*:*:*:*:*:*:*", - "matchCriteriaId": "4E8F7CC3-9108-49C5-A0EE-DCC86A949C74" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.6.0:*:*:*:*:*:*:*", - "matchCriteriaId": "97CD0D0C-B3AB-47B2-90DB-D559BFCFC670" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.6.1:*:*:*:*:*:*:*", - "matchCriteriaId": "E8A6B04A-AA56-43F4-835A-86795055A869" - }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", diff --git a/CVE-2016/CVE-2016-19xx/CVE-2016-1961.json b/CVE-2016/CVE-2016-19xx/CVE-2016-1961.json index b94b9f51a34..4e868c1498a 100644 --- a/CVE-2016/CVE-2016-19xx/CVE-2016-1961.json +++ b/CVE-2016/CVE-2016-19xx/CVE-2016-1961.json @@ -2,7 +2,7 @@ "id": "CVE-2016-1961", "sourceIdentifier": "security@mozilla.org", "published": "2016-03-13T18:59:10.693", - "lastModified": "2019-12-27T16:08:55.810", + "lastModified": "2024-10-21T13:11:23.977", "vulnStatus": "Modified", "cveTags": [], "evaluatorComment": "CWE-416: Use After Free", @@ -120,6 +120,26 @@ "versionEndIncluding": "44.0.2", "matchCriteriaId": "A2CA2CAD-3088-47C2-AE3A-607E6064E9BE" }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:38.5.0:*:*:*:*:*:*:*", + "matchCriteriaId": "62B4E871-0ACB-4EC5-8392-EAD0DF25E64B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:38.5.1:*:*:*:*:*:*:*", + "matchCriteriaId": "435D6EF5-C879-4121-9D47-EF2236E53409" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:38.6.0:*:*:*:*:*:*:*", + "matchCriteriaId": "A5963D11-D2F4-40A7-81CE-E034C91FCCBD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:38.6.1:*:*:*:*:*:*:*", + "matchCriteriaId": "5FB022A7-B792-4AC0-B2CF-AF6F384AE719" + }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.0:*:*:*:*:*:*:*", @@ -165,26 +185,6 @@ "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "B1F6A91A-4C19-47FB-B538-2B1837F68C61" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.5.0:*:*:*:*:*:*:*", - "matchCriteriaId": "4773E493-5198-48FD-97D3-C20C36DF76E1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.5.1:*:*:*:*:*:*:*", - "matchCriteriaId": "4E8F7CC3-9108-49C5-A0EE-DCC86A949C74" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.6.0:*:*:*:*:*:*:*", - "matchCriteriaId": "97CD0D0C-B3AB-47B2-90DB-D559BFCFC670" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.6.1:*:*:*:*:*:*:*", - "matchCriteriaId": "E8A6B04A-AA56-43F4-835A-86795055A869" - }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", diff --git a/CVE-2016/CVE-2016-19xx/CVE-2016-1962.json b/CVE-2016/CVE-2016-19xx/CVE-2016-1962.json index faab7d7593e..b78f0b1dbb4 100644 --- a/CVE-2016/CVE-2016-19xx/CVE-2016-1962.json +++ b/CVE-2016/CVE-2016-19xx/CVE-2016-1962.json @@ -2,7 +2,7 @@ "id": "CVE-2016-1962", "sourceIdentifier": "security@mozilla.org", "published": "2016-03-13T18:59:11.927", - "lastModified": "2019-12-27T16:08:55.810", + "lastModified": "2024-10-21T13:11:23.977", "vulnStatus": "Modified", "cveTags": [], "evaluatorComment": "CWE-416: Use After Free", @@ -90,6 +90,26 @@ "versionEndIncluding": "44.0.2", "matchCriteriaId": "A2CA2CAD-3088-47C2-AE3A-607E6064E9BE" }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:38.5.0:*:*:*:*:*:*:*", + "matchCriteriaId": "62B4E871-0ACB-4EC5-8392-EAD0DF25E64B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:38.5.1:*:*:*:*:*:*:*", + "matchCriteriaId": "435D6EF5-C879-4121-9D47-EF2236E53409" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:38.6.0:*:*:*:*:*:*:*", + "matchCriteriaId": "A5963D11-D2F4-40A7-81CE-E034C91FCCBD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:38.6.1:*:*:*:*:*:*:*", + "matchCriteriaId": "5FB022A7-B792-4AC0-B2CF-AF6F384AE719" + }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.0:*:*:*:*:*:*:*", @@ -134,26 +154,6 @@ "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "B1F6A91A-4C19-47FB-B538-2B1837F68C61" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.5.0:*:*:*:*:*:*:*", - "matchCriteriaId": "4773E493-5198-48FD-97D3-C20C36DF76E1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.5.1:*:*:*:*:*:*:*", - "matchCriteriaId": "4E8F7CC3-9108-49C5-A0EE-DCC86A949C74" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.6.0:*:*:*:*:*:*:*", - "matchCriteriaId": "97CD0D0C-B3AB-47B2-90DB-D559BFCFC670" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.6.1:*:*:*:*:*:*:*", - "matchCriteriaId": "E8A6B04A-AA56-43F4-835A-86795055A869" } ] } diff --git a/CVE-2016/CVE-2016-19xx/CVE-2016-1964.json b/CVE-2016/CVE-2016-19xx/CVE-2016-1964.json index c44636f75cf..a4e3ac2e9f1 100644 --- a/CVE-2016/CVE-2016-19xx/CVE-2016-1964.json +++ b/CVE-2016/CVE-2016-19xx/CVE-2016-1964.json @@ -2,7 +2,7 @@ "id": "CVE-2016-1964", "sourceIdentifier": "security@mozilla.org", "published": "2016-03-13T18:59:13.693", - "lastModified": "2019-12-27T16:08:55.810", + "lastModified": "2024-10-21T13:11:23.977", "vulnStatus": "Modified", "cveTags": [], "evaluatorComment": "CWE-416: Use After Free", @@ -145,6 +145,26 @@ "versionEndIncluding": "44.0.2", "matchCriteriaId": "A2CA2CAD-3088-47C2-AE3A-607E6064E9BE" }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:38.5.0:*:*:*:*:*:*:*", + "matchCriteriaId": "62B4E871-0ACB-4EC5-8392-EAD0DF25E64B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:38.5.1:*:*:*:*:*:*:*", + "matchCriteriaId": "435D6EF5-C879-4121-9D47-EF2236E53409" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:38.6.0:*:*:*:*:*:*:*", + "matchCriteriaId": "A5963D11-D2F4-40A7-81CE-E034C91FCCBD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:38.6.1:*:*:*:*:*:*:*", + "matchCriteriaId": "5FB022A7-B792-4AC0-B2CF-AF6F384AE719" + }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.0:*:*:*:*:*:*:*", @@ -190,26 +210,6 @@ "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "B1F6A91A-4C19-47FB-B538-2B1837F68C61" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.5.0:*:*:*:*:*:*:*", - "matchCriteriaId": "4773E493-5198-48FD-97D3-C20C36DF76E1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.5.1:*:*:*:*:*:*:*", - "matchCriteriaId": "4E8F7CC3-9108-49C5-A0EE-DCC86A949C74" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.6.0:*:*:*:*:*:*:*", - "matchCriteriaId": "97CD0D0C-B3AB-47B2-90DB-D559BFCFC670" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.6.1:*:*:*:*:*:*:*", - "matchCriteriaId": "E8A6B04A-AA56-43F4-835A-86795055A869" - }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", diff --git a/CVE-2016/CVE-2016-19xx/CVE-2016-1965.json b/CVE-2016/CVE-2016-19xx/CVE-2016-1965.json index 639ef1b3905..c7a12927513 100644 --- a/CVE-2016/CVE-2016-19xx/CVE-2016-1965.json +++ b/CVE-2016/CVE-2016-19xx/CVE-2016-1965.json @@ -2,7 +2,7 @@ "id": "CVE-2016-1965", "sourceIdentifier": "security@mozilla.org", "published": "2016-03-13T18:59:14.553", - "lastModified": "2019-12-27T16:08:55.810", + "lastModified": "2024-10-21T13:11:23.977", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -89,6 +89,26 @@ "versionEndIncluding": "44.0.2", "matchCriteriaId": "A2CA2CAD-3088-47C2-AE3A-607E6064E9BE" }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:38.5.0:*:*:*:*:*:*:*", + "matchCriteriaId": "62B4E871-0ACB-4EC5-8392-EAD0DF25E64B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:38.5.1:*:*:*:*:*:*:*", + "matchCriteriaId": "435D6EF5-C879-4121-9D47-EF2236E53409" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:38.6.0:*:*:*:*:*:*:*", + "matchCriteriaId": "A5963D11-D2F4-40A7-81CE-E034C91FCCBD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:38.6.1:*:*:*:*:*:*:*", + "matchCriteriaId": "5FB022A7-B792-4AC0-B2CF-AF6F384AE719" + }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.0:*:*:*:*:*:*:*", @@ -133,26 +153,6 @@ "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "B1F6A91A-4C19-47FB-B538-2B1837F68C61" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.5.0:*:*:*:*:*:*:*", - "matchCriteriaId": "4773E493-5198-48FD-97D3-C20C36DF76E1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.5.1:*:*:*:*:*:*:*", - "matchCriteriaId": "4E8F7CC3-9108-49C5-A0EE-DCC86A949C74" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.6.0:*:*:*:*:*:*:*", - "matchCriteriaId": "97CD0D0C-B3AB-47B2-90DB-D559BFCFC670" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.6.1:*:*:*:*:*:*:*", - "matchCriteriaId": "E8A6B04A-AA56-43F4-835A-86795055A869" } ] } diff --git a/CVE-2016/CVE-2016-19xx/CVE-2016-1966.json b/CVE-2016/CVE-2016-19xx/CVE-2016-1966.json index 2e955248168..5935e7c4917 100644 --- a/CVE-2016/CVE-2016-19xx/CVE-2016-1966.json +++ b/CVE-2016/CVE-2016-19xx/CVE-2016-1966.json @@ -2,7 +2,7 @@ "id": "CVE-2016-1966", "sourceIdentifier": "security@mozilla.org", "published": "2016-03-13T18:59:15.460", - "lastModified": "2019-12-27T16:08:55.810", + "lastModified": "2024-10-21T13:11:23.977", "vulnStatus": "Modified", "cveTags": [], "evaluatorComment": "CWE-476: NULL Pointer Dereference", @@ -115,6 +115,26 @@ "versionEndIncluding": "44.0.2", "matchCriteriaId": "A2CA2CAD-3088-47C2-AE3A-607E6064E9BE" }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:38.5.0:*:*:*:*:*:*:*", + "matchCriteriaId": "62B4E871-0ACB-4EC5-8392-EAD0DF25E64B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:38.5.1:*:*:*:*:*:*:*", + "matchCriteriaId": "435D6EF5-C879-4121-9D47-EF2236E53409" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:38.6.0:*:*:*:*:*:*:*", + "matchCriteriaId": "A5963D11-D2F4-40A7-81CE-E034C91FCCBD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:38.6.1:*:*:*:*:*:*:*", + "matchCriteriaId": "5FB022A7-B792-4AC0-B2CF-AF6F384AE719" + }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.0:*:*:*:*:*:*:*", @@ -160,26 +180,6 @@ "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "B1F6A91A-4C19-47FB-B538-2B1837F68C61" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.5.0:*:*:*:*:*:*:*", - "matchCriteriaId": "4773E493-5198-48FD-97D3-C20C36DF76E1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.5.1:*:*:*:*:*:*:*", - "matchCriteriaId": "4E8F7CC3-9108-49C5-A0EE-DCC86A949C74" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.6.0:*:*:*:*:*:*:*", - "matchCriteriaId": "97CD0D0C-B3AB-47B2-90DB-D559BFCFC670" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.6.1:*:*:*:*:*:*:*", - "matchCriteriaId": "E8A6B04A-AA56-43F4-835A-86795055A869" - }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", diff --git a/CVE-2016/CVE-2016-19xx/CVE-2016-1969.json b/CVE-2016/CVE-2016-19xx/CVE-2016-1969.json index a1d0f4a8f9f..0fa10a89b1e 100644 --- a/CVE-2016/CVE-2016-19xx/CVE-2016-1969.json +++ b/CVE-2016/CVE-2016-19xx/CVE-2016-1969.json @@ -2,7 +2,7 @@ "id": "CVE-2016-1969", "sourceIdentifier": "security@mozilla.org", "published": "2016-03-13T18:59:18.583", - "lastModified": "2016-12-03T03:23:52.403", + "lastModified": "2024-10-21T13:11:23.977", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -105,6 +105,21 @@ "versionEndIncluding": "44.0.2", "matchCriteriaId": "A2CA2CAD-3088-47C2-AE3A-607E6064E9BE" }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:38.5.0:*:*:*:*:*:*:*", + "matchCriteriaId": "62B4E871-0ACB-4EC5-8392-EAD0DF25E64B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:38.5.1:*:*:*:*:*:*:*", + "matchCriteriaId": "435D6EF5-C879-4121-9D47-EF2236E53409" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:38.6.0:*:*:*:*:*:*:*", + "matchCriteriaId": "A5963D11-D2F4-40A7-81CE-E034C91FCCBD" + }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.0:*:*:*:*:*:*:*", @@ -149,21 +164,6 @@ "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "B1F6A91A-4C19-47FB-B538-2B1837F68C61" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.5.0:*:*:*:*:*:*:*", - "matchCriteriaId": "4773E493-5198-48FD-97D3-C20C36DF76E1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.5.1:*:*:*:*:*:*:*", - "matchCriteriaId": "4E8F7CC3-9108-49C5-A0EE-DCC86A949C74" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.6.0:*:*:*:*:*:*:*", - "matchCriteriaId": "97CD0D0C-B3AB-47B2-90DB-D559BFCFC670" } ] } diff --git a/CVE-2016/CVE-2016-19xx/CVE-2016-1974.json b/CVE-2016/CVE-2016-19xx/CVE-2016-1974.json index 177ec9dba93..314ccd61fba 100644 --- a/CVE-2016/CVE-2016-19xx/CVE-2016-1974.json +++ b/CVE-2016/CVE-2016-19xx/CVE-2016-1974.json @@ -2,7 +2,7 @@ "id": "CVE-2016-1974", "sourceIdentifier": "security@mozilla.org", "published": "2016-03-13T18:59:23.383", - "lastModified": "2019-12-27T16:08:55.810", + "lastModified": "2024-10-21T13:11:23.977", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -89,6 +89,26 @@ "versionEndIncluding": "44.0.2", "matchCriteriaId": "A2CA2CAD-3088-47C2-AE3A-607E6064E9BE" }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:38.5.0:*:*:*:*:*:*:*", + "matchCriteriaId": "62B4E871-0ACB-4EC5-8392-EAD0DF25E64B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:38.5.1:*:*:*:*:*:*:*", + "matchCriteriaId": "435D6EF5-C879-4121-9D47-EF2236E53409" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:38.6.0:*:*:*:*:*:*:*", + "matchCriteriaId": "A5963D11-D2F4-40A7-81CE-E034C91FCCBD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:38.6.1:*:*:*:*:*:*:*", + "matchCriteriaId": "5FB022A7-B792-4AC0-B2CF-AF6F384AE719" + }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.0:*:*:*:*:*:*:*", @@ -134,26 +154,6 @@ "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "B1F6A91A-4C19-47FB-B538-2B1837F68C61" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.5.0:*:*:*:*:*:*:*", - "matchCriteriaId": "4773E493-5198-48FD-97D3-C20C36DF76E1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.5.1:*:*:*:*:*:*:*", - "matchCriteriaId": "4E8F7CC3-9108-49C5-A0EE-DCC86A949C74" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.6.0:*:*:*:*:*:*:*", - "matchCriteriaId": "97CD0D0C-B3AB-47B2-90DB-D559BFCFC670" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.6.1:*:*:*:*:*:*:*", - "matchCriteriaId": "E8A6B04A-AA56-43F4-835A-86795055A869" - }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", diff --git a/CVE-2016/CVE-2016-19xx/CVE-2016-1977.json b/CVE-2016/CVE-2016-19xx/CVE-2016-1977.json index fbfa8432137..c8f0c5bed68 100644 --- a/CVE-2016/CVE-2016-19xx/CVE-2016-1977.json +++ b/CVE-2016/CVE-2016-19xx/CVE-2016-1977.json @@ -2,7 +2,7 @@ "id": "CVE-2016-1977", "sourceIdentifier": "security@mozilla.org", "published": "2016-03-13T18:59:26.430", - "lastModified": "2019-12-27T16:08:55.810", + "lastModified": "2024-10-21T13:11:23.977", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -160,6 +160,26 @@ "versionEndIncluding": "44.0.2", "matchCriteriaId": "A2CA2CAD-3088-47C2-AE3A-607E6064E9BE" }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:38.5.0:*:*:*:*:*:*:*", + "matchCriteriaId": "62B4E871-0ACB-4EC5-8392-EAD0DF25E64B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:38.5.1:*:*:*:*:*:*:*", + "matchCriteriaId": "435D6EF5-C879-4121-9D47-EF2236E53409" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:38.6.0:*:*:*:*:*:*:*", + "matchCriteriaId": "A5963D11-D2F4-40A7-81CE-E034C91FCCBD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:38.6.1:*:*:*:*:*:*:*", + "matchCriteriaId": "5FB022A7-B792-4AC0-B2CF-AF6F384AE719" + }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.0:*:*:*:*:*:*:*", @@ -204,26 +224,6 @@ "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "B1F6A91A-4C19-47FB-B538-2B1837F68C61" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.5.0:*:*:*:*:*:*:*", - "matchCriteriaId": "4773E493-5198-48FD-97D3-C20C36DF76E1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.5.1:*:*:*:*:*:*:*", - "matchCriteriaId": "4E8F7CC3-9108-49C5-A0EE-DCC86A949C74" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.6.0:*:*:*:*:*:*:*", - "matchCriteriaId": "97CD0D0C-B3AB-47B2-90DB-D559BFCFC670" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.6.1:*:*:*:*:*:*:*", - "matchCriteriaId": "E8A6B04A-AA56-43F4-835A-86795055A869" } ] } diff --git a/CVE-2016/CVE-2016-27xx/CVE-2016-2790.json b/CVE-2016/CVE-2016-27xx/CVE-2016-2790.json index f2b1789dcd4..5d24798c801 100644 --- a/CVE-2016/CVE-2016-27xx/CVE-2016-2790.json +++ b/CVE-2016/CVE-2016-27xx/CVE-2016-2790.json @@ -2,7 +2,7 @@ "id": "CVE-2016-2790", "sourceIdentifier": "security@mozilla.org", "published": "2016-03-13T18:59:29.133", - "lastModified": "2019-12-27T16:08:55.810", + "lastModified": "2024-10-21T13:11:23.977", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -119,6 +119,26 @@ "versionEndIncluding": "44.0.2", "matchCriteriaId": "A2CA2CAD-3088-47C2-AE3A-607E6064E9BE" }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:38.5.0:*:*:*:*:*:*:*", + "matchCriteriaId": "62B4E871-0ACB-4EC5-8392-EAD0DF25E64B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:38.5.1:*:*:*:*:*:*:*", + "matchCriteriaId": "435D6EF5-C879-4121-9D47-EF2236E53409" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:38.6.0:*:*:*:*:*:*:*", + "matchCriteriaId": "A5963D11-D2F4-40A7-81CE-E034C91FCCBD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:38.6.1:*:*:*:*:*:*:*", + "matchCriteriaId": "5FB022A7-B792-4AC0-B2CF-AF6F384AE719" + }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.0:*:*:*:*:*:*:*", @@ -163,26 +183,6 @@ "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "B1F6A91A-4C19-47FB-B538-2B1837F68C61" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.5.0:*:*:*:*:*:*:*", - "matchCriteriaId": "4773E493-5198-48FD-97D3-C20C36DF76E1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.5.1:*:*:*:*:*:*:*", - "matchCriteriaId": "4E8F7CC3-9108-49C5-A0EE-DCC86A949C74" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.6.0:*:*:*:*:*:*:*", - "matchCriteriaId": "97CD0D0C-B3AB-47B2-90DB-D559BFCFC670" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.6.1:*:*:*:*:*:*:*", - "matchCriteriaId": "E8A6B04A-AA56-43F4-835A-86795055A869" } ] } diff --git a/CVE-2016/CVE-2016-27xx/CVE-2016-2791.json b/CVE-2016/CVE-2016-27xx/CVE-2016-2791.json index c784623a132..6c07ff2bdcb 100644 --- a/CVE-2016/CVE-2016-27xx/CVE-2016-2791.json +++ b/CVE-2016/CVE-2016-27xx/CVE-2016-2791.json @@ -2,7 +2,7 @@ "id": "CVE-2016-2791", "sourceIdentifier": "security@mozilla.org", "published": "2016-03-13T18:59:30.133", - "lastModified": "2019-12-27T16:08:55.810", + "lastModified": "2024-10-21T13:11:23.977", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -119,6 +119,26 @@ "versionEndIncluding": "44.0.2", "matchCriteriaId": "A2CA2CAD-3088-47C2-AE3A-607E6064E9BE" }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:38.5.0:*:*:*:*:*:*:*", + "matchCriteriaId": "62B4E871-0ACB-4EC5-8392-EAD0DF25E64B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:38.5.1:*:*:*:*:*:*:*", + "matchCriteriaId": "435D6EF5-C879-4121-9D47-EF2236E53409" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:38.6.0:*:*:*:*:*:*:*", + "matchCriteriaId": "A5963D11-D2F4-40A7-81CE-E034C91FCCBD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:38.6.1:*:*:*:*:*:*:*", + "matchCriteriaId": "5FB022A7-B792-4AC0-B2CF-AF6F384AE719" + }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.0:*:*:*:*:*:*:*", @@ -163,26 +183,6 @@ "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "B1F6A91A-4C19-47FB-B538-2B1837F68C61" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.5.0:*:*:*:*:*:*:*", - "matchCriteriaId": "4773E493-5198-48FD-97D3-C20C36DF76E1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.5.1:*:*:*:*:*:*:*", - "matchCriteriaId": "4E8F7CC3-9108-49C5-A0EE-DCC86A949C74" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.6.0:*:*:*:*:*:*:*", - "matchCriteriaId": "97CD0D0C-B3AB-47B2-90DB-D559BFCFC670" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.6.1:*:*:*:*:*:*:*", - "matchCriteriaId": "E8A6B04A-AA56-43F4-835A-86795055A869" } ] } diff --git a/CVE-2016/CVE-2016-27xx/CVE-2016-2792.json b/CVE-2016/CVE-2016-27xx/CVE-2016-2792.json index e10f420c6fd..29d09ed9c55 100644 --- a/CVE-2016/CVE-2016-27xx/CVE-2016-2792.json +++ b/CVE-2016/CVE-2016-27xx/CVE-2016-2792.json @@ -2,7 +2,7 @@ "id": "CVE-2016-2792", "sourceIdentifier": "security@mozilla.org", "published": "2016-03-13T18:59:31.197", - "lastModified": "2019-12-27T16:08:55.810", + "lastModified": "2024-10-21T13:11:23.977", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -105,6 +105,26 @@ "versionEndIncluding": "44.0.2", "matchCriteriaId": "A2CA2CAD-3088-47C2-AE3A-607E6064E9BE" }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:38.5.0:*:*:*:*:*:*:*", + "matchCriteriaId": "62B4E871-0ACB-4EC5-8392-EAD0DF25E64B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:38.5.1:*:*:*:*:*:*:*", + "matchCriteriaId": "435D6EF5-C879-4121-9D47-EF2236E53409" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:38.6.0:*:*:*:*:*:*:*", + "matchCriteriaId": "A5963D11-D2F4-40A7-81CE-E034C91FCCBD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:38.6.1:*:*:*:*:*:*:*", + "matchCriteriaId": "5FB022A7-B792-4AC0-B2CF-AF6F384AE719" + }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.0:*:*:*:*:*:*:*", @@ -149,26 +169,6 @@ "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "B1F6A91A-4C19-47FB-B538-2B1837F68C61" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.5.0:*:*:*:*:*:*:*", - "matchCriteriaId": "4773E493-5198-48FD-97D3-C20C36DF76E1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.5.1:*:*:*:*:*:*:*", - "matchCriteriaId": "4E8F7CC3-9108-49C5-A0EE-DCC86A949C74" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.6.0:*:*:*:*:*:*:*", - "matchCriteriaId": "97CD0D0C-B3AB-47B2-90DB-D559BFCFC670" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.6.1:*:*:*:*:*:*:*", - "matchCriteriaId": "E8A6B04A-AA56-43F4-835A-86795055A869" } ] } diff --git a/CVE-2016/CVE-2016-27xx/CVE-2016-2793.json b/CVE-2016/CVE-2016-27xx/CVE-2016-2793.json index ebc1c68265f..0f985279f57 100644 --- a/CVE-2016/CVE-2016-27xx/CVE-2016-2793.json +++ b/CVE-2016/CVE-2016-27xx/CVE-2016-2793.json @@ -2,7 +2,7 @@ "id": "CVE-2016-2793", "sourceIdentifier": "security@mozilla.org", "published": "2016-03-13T18:59:32.180", - "lastModified": "2019-12-27T16:08:55.810", + "lastModified": "2024-10-21T13:11:23.977", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -114,6 +114,26 @@ "versionEndIncluding": "44.0.2", "matchCriteriaId": "A2CA2CAD-3088-47C2-AE3A-607E6064E9BE" }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:38.5.0:*:*:*:*:*:*:*", + "matchCriteriaId": "62B4E871-0ACB-4EC5-8392-EAD0DF25E64B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:38.5.1:*:*:*:*:*:*:*", + "matchCriteriaId": "435D6EF5-C879-4121-9D47-EF2236E53409" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:38.6.0:*:*:*:*:*:*:*", + "matchCriteriaId": "A5963D11-D2F4-40A7-81CE-E034C91FCCBD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:38.6.1:*:*:*:*:*:*:*", + "matchCriteriaId": "5FB022A7-B792-4AC0-B2CF-AF6F384AE719" + }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.0:*:*:*:*:*:*:*", @@ -158,26 +178,6 @@ "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "B1F6A91A-4C19-47FB-B538-2B1837F68C61" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.5.0:*:*:*:*:*:*:*", - "matchCriteriaId": "4773E493-5198-48FD-97D3-C20C36DF76E1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.5.1:*:*:*:*:*:*:*", - "matchCriteriaId": "4E8F7CC3-9108-49C5-A0EE-DCC86A949C74" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.6.0:*:*:*:*:*:*:*", - "matchCriteriaId": "97CD0D0C-B3AB-47B2-90DB-D559BFCFC670" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.6.1:*:*:*:*:*:*:*", - "matchCriteriaId": "E8A6B04A-AA56-43F4-835A-86795055A869" } ] } diff --git a/CVE-2016/CVE-2016-27xx/CVE-2016-2794.json b/CVE-2016/CVE-2016-27xx/CVE-2016-2794.json index 29cf2d82ebb..25024afe44b 100644 --- a/CVE-2016/CVE-2016-27xx/CVE-2016-2794.json +++ b/CVE-2016/CVE-2016-27xx/CVE-2016-2794.json @@ -2,7 +2,7 @@ "id": "CVE-2016-2794", "sourceIdentifier": "security@mozilla.org", "published": "2016-03-13T18:59:33.180", - "lastModified": "2019-12-27T16:08:55.810", + "lastModified": "2024-10-21T13:11:23.977", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -89,6 +89,26 @@ "versionEndIncluding": "44.0.2", "matchCriteriaId": "A2CA2CAD-3088-47C2-AE3A-607E6064E9BE" }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:38.5.0:*:*:*:*:*:*:*", + "matchCriteriaId": "62B4E871-0ACB-4EC5-8392-EAD0DF25E64B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:38.5.1:*:*:*:*:*:*:*", + "matchCriteriaId": "435D6EF5-C879-4121-9D47-EF2236E53409" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:38.6.0:*:*:*:*:*:*:*", + "matchCriteriaId": "A5963D11-D2F4-40A7-81CE-E034C91FCCBD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:38.6.1:*:*:*:*:*:*:*", + "matchCriteriaId": "5FB022A7-B792-4AC0-B2CF-AF6F384AE719" + }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.0:*:*:*:*:*:*:*", @@ -133,26 +153,6 @@ "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "B1F6A91A-4C19-47FB-B538-2B1837F68C61" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.5.0:*:*:*:*:*:*:*", - "matchCriteriaId": "4773E493-5198-48FD-97D3-C20C36DF76E1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.5.1:*:*:*:*:*:*:*", - "matchCriteriaId": "4E8F7CC3-9108-49C5-A0EE-DCC86A949C74" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.6.0:*:*:*:*:*:*:*", - "matchCriteriaId": "97CD0D0C-B3AB-47B2-90DB-D559BFCFC670" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.6.1:*:*:*:*:*:*:*", - "matchCriteriaId": "E8A6B04A-AA56-43F4-835A-86795055A869" } ] } diff --git a/CVE-2016/CVE-2016-27xx/CVE-2016-2795.json b/CVE-2016/CVE-2016-27xx/CVE-2016-2795.json index 34238ee09ef..1838a75087c 100644 --- a/CVE-2016/CVE-2016-27xx/CVE-2016-2795.json +++ b/CVE-2016/CVE-2016-27xx/CVE-2016-2795.json @@ -2,7 +2,7 @@ "id": "CVE-2016-2795", "sourceIdentifier": "security@mozilla.org", "published": "2016-03-13T18:59:34.163", - "lastModified": "2019-12-27T16:08:55.810", + "lastModified": "2024-10-21T13:11:23.977", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -144,6 +144,26 @@ "versionEndIncluding": "44.0.2", "matchCriteriaId": "A2CA2CAD-3088-47C2-AE3A-607E6064E9BE" }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:38.5.0:*:*:*:*:*:*:*", + "matchCriteriaId": "62B4E871-0ACB-4EC5-8392-EAD0DF25E64B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:38.5.1:*:*:*:*:*:*:*", + "matchCriteriaId": "435D6EF5-C879-4121-9D47-EF2236E53409" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:38.6.0:*:*:*:*:*:*:*", + "matchCriteriaId": "A5963D11-D2F4-40A7-81CE-E034C91FCCBD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:38.6.1:*:*:*:*:*:*:*", + "matchCriteriaId": "5FB022A7-B792-4AC0-B2CF-AF6F384AE719" + }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.0:*:*:*:*:*:*:*", @@ -188,26 +208,6 @@ "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "B1F6A91A-4C19-47FB-B538-2B1837F68C61" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.5.0:*:*:*:*:*:*:*", - "matchCriteriaId": "4773E493-5198-48FD-97D3-C20C36DF76E1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.5.1:*:*:*:*:*:*:*", - "matchCriteriaId": "4E8F7CC3-9108-49C5-A0EE-DCC86A949C74" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.6.0:*:*:*:*:*:*:*", - "matchCriteriaId": "97CD0D0C-B3AB-47B2-90DB-D559BFCFC670" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.6.1:*:*:*:*:*:*:*", - "matchCriteriaId": "E8A6B04A-AA56-43F4-835A-86795055A869" } ] } diff --git a/CVE-2016/CVE-2016-27xx/CVE-2016-2796.json b/CVE-2016/CVE-2016-27xx/CVE-2016-2796.json index 2d2e0af5993..af352057a44 100644 --- a/CVE-2016/CVE-2016-27xx/CVE-2016-2796.json +++ b/CVE-2016/CVE-2016-27xx/CVE-2016-2796.json @@ -2,7 +2,7 @@ "id": "CVE-2016-2796", "sourceIdentifier": "security@mozilla.org", "published": "2016-03-13T18:59:35.397", - "lastModified": "2019-12-27T16:08:55.810", + "lastModified": "2024-10-21T13:11:23.977", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -160,6 +160,26 @@ "versionEndIncluding": "44.0.2", "matchCriteriaId": "A2CA2CAD-3088-47C2-AE3A-607E6064E9BE" }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:38.5.0:*:*:*:*:*:*:*", + "matchCriteriaId": "62B4E871-0ACB-4EC5-8392-EAD0DF25E64B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:38.5.1:*:*:*:*:*:*:*", + "matchCriteriaId": "435D6EF5-C879-4121-9D47-EF2236E53409" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:38.6.0:*:*:*:*:*:*:*", + "matchCriteriaId": "A5963D11-D2F4-40A7-81CE-E034C91FCCBD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:38.6.1:*:*:*:*:*:*:*", + "matchCriteriaId": "5FB022A7-B792-4AC0-B2CF-AF6F384AE719" + }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.0:*:*:*:*:*:*:*", @@ -204,26 +224,6 @@ "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "B1F6A91A-4C19-47FB-B538-2B1837F68C61" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.5.0:*:*:*:*:*:*:*", - "matchCriteriaId": "4773E493-5198-48FD-97D3-C20C36DF76E1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.5.1:*:*:*:*:*:*:*", - "matchCriteriaId": "4E8F7CC3-9108-49C5-A0EE-DCC86A949C74" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.6.0:*:*:*:*:*:*:*", - "matchCriteriaId": "97CD0D0C-B3AB-47B2-90DB-D559BFCFC670" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.6.1:*:*:*:*:*:*:*", - "matchCriteriaId": "E8A6B04A-AA56-43F4-835A-86795055A869" } ] } diff --git a/CVE-2016/CVE-2016-27xx/CVE-2016-2797.json b/CVE-2016/CVE-2016-27xx/CVE-2016-2797.json index 64b47a4500f..afaa56561fe 100644 --- a/CVE-2016/CVE-2016-27xx/CVE-2016-2797.json +++ b/CVE-2016/CVE-2016-27xx/CVE-2016-2797.json @@ -2,7 +2,7 @@ "id": "CVE-2016-2797", "sourceIdentifier": "security@mozilla.org", "published": "2016-03-13T18:59:36.337", - "lastModified": "2019-12-27T16:08:55.810", + "lastModified": "2024-10-21T13:11:23.977", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -114,6 +114,26 @@ "versionEndIncluding": "44.0.2", "matchCriteriaId": "A2CA2CAD-3088-47C2-AE3A-607E6064E9BE" }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:38.5.0:*:*:*:*:*:*:*", + "matchCriteriaId": "62B4E871-0ACB-4EC5-8392-EAD0DF25E64B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:38.5.1:*:*:*:*:*:*:*", + "matchCriteriaId": "435D6EF5-C879-4121-9D47-EF2236E53409" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:38.6.0:*:*:*:*:*:*:*", + "matchCriteriaId": "A5963D11-D2F4-40A7-81CE-E034C91FCCBD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:38.6.1:*:*:*:*:*:*:*", + "matchCriteriaId": "5FB022A7-B792-4AC0-B2CF-AF6F384AE719" + }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.0:*:*:*:*:*:*:*", @@ -158,26 +178,6 @@ "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "B1F6A91A-4C19-47FB-B538-2B1837F68C61" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.5.0:*:*:*:*:*:*:*", - "matchCriteriaId": "4773E493-5198-48FD-97D3-C20C36DF76E1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.5.1:*:*:*:*:*:*:*", - "matchCriteriaId": "4E8F7CC3-9108-49C5-A0EE-DCC86A949C74" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.6.0:*:*:*:*:*:*:*", - "matchCriteriaId": "97CD0D0C-B3AB-47B2-90DB-D559BFCFC670" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.6.1:*:*:*:*:*:*:*", - "matchCriteriaId": "E8A6B04A-AA56-43F4-835A-86795055A869" } ] } diff --git a/CVE-2016/CVE-2016-27xx/CVE-2016-2798.json b/CVE-2016/CVE-2016-27xx/CVE-2016-2798.json index 7041f77266b..7b0683c28d5 100644 --- a/CVE-2016/CVE-2016-27xx/CVE-2016-2798.json +++ b/CVE-2016/CVE-2016-27xx/CVE-2016-2798.json @@ -2,7 +2,7 @@ "id": "CVE-2016-2798", "sourceIdentifier": "security@mozilla.org", "published": "2016-03-13T18:59:37.243", - "lastModified": "2019-12-27T16:08:55.810", + "lastModified": "2024-10-21T13:11:23.977", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -89,6 +89,26 @@ "versionEndIncluding": "44.0.2", "matchCriteriaId": "A2CA2CAD-3088-47C2-AE3A-607E6064E9BE" }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:38.5.0:*:*:*:*:*:*:*", + "matchCriteriaId": "62B4E871-0ACB-4EC5-8392-EAD0DF25E64B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:38.5.1:*:*:*:*:*:*:*", + "matchCriteriaId": "435D6EF5-C879-4121-9D47-EF2236E53409" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:38.6.0:*:*:*:*:*:*:*", + "matchCriteriaId": "A5963D11-D2F4-40A7-81CE-E034C91FCCBD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:38.6.1:*:*:*:*:*:*:*", + "matchCriteriaId": "5FB022A7-B792-4AC0-B2CF-AF6F384AE719" + }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.0:*:*:*:*:*:*:*", @@ -133,26 +153,6 @@ "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "B1F6A91A-4C19-47FB-B538-2B1837F68C61" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.5.0:*:*:*:*:*:*:*", - "matchCriteriaId": "4773E493-5198-48FD-97D3-C20C36DF76E1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.5.1:*:*:*:*:*:*:*", - "matchCriteriaId": "4E8F7CC3-9108-49C5-A0EE-DCC86A949C74" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.6.0:*:*:*:*:*:*:*", - "matchCriteriaId": "97CD0D0C-B3AB-47B2-90DB-D559BFCFC670" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.6.1:*:*:*:*:*:*:*", - "matchCriteriaId": "E8A6B04A-AA56-43F4-835A-86795055A869" } ] } diff --git a/CVE-2016/CVE-2016-27xx/CVE-2016-2799.json b/CVE-2016/CVE-2016-27xx/CVE-2016-2799.json index 347438ba42f..a2f1a834dd2 100644 --- a/CVE-2016/CVE-2016-27xx/CVE-2016-2799.json +++ b/CVE-2016/CVE-2016-27xx/CVE-2016-2799.json @@ -2,7 +2,7 @@ "id": "CVE-2016-2799", "sourceIdentifier": "security@mozilla.org", "published": "2016-03-13T18:59:38.163", - "lastModified": "2019-12-27T16:08:55.810", + "lastModified": "2024-10-21T13:11:23.977", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -144,6 +144,26 @@ "versionEndIncluding": "44.0.2", "matchCriteriaId": "A2CA2CAD-3088-47C2-AE3A-607E6064E9BE" }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:38.5.0:*:*:*:*:*:*:*", + "matchCriteriaId": "62B4E871-0ACB-4EC5-8392-EAD0DF25E64B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:38.5.1:*:*:*:*:*:*:*", + "matchCriteriaId": "435D6EF5-C879-4121-9D47-EF2236E53409" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:38.6.0:*:*:*:*:*:*:*", + "matchCriteriaId": "A5963D11-D2F4-40A7-81CE-E034C91FCCBD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:38.6.1:*:*:*:*:*:*:*", + "matchCriteriaId": "5FB022A7-B792-4AC0-B2CF-AF6F384AE719" + }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.0:*:*:*:*:*:*:*", @@ -188,26 +208,6 @@ "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "B1F6A91A-4C19-47FB-B538-2B1837F68C61" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.5.0:*:*:*:*:*:*:*", - "matchCriteriaId": "4773E493-5198-48FD-97D3-C20C36DF76E1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.5.1:*:*:*:*:*:*:*", - "matchCriteriaId": "4E8F7CC3-9108-49C5-A0EE-DCC86A949C74" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.6.0:*:*:*:*:*:*:*", - "matchCriteriaId": "97CD0D0C-B3AB-47B2-90DB-D559BFCFC670" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.6.1:*:*:*:*:*:*:*", - "matchCriteriaId": "E8A6B04A-AA56-43F4-835A-86795055A869" } ] } diff --git a/CVE-2016/CVE-2016-28xx/CVE-2016-2800.json b/CVE-2016/CVE-2016-28xx/CVE-2016-2800.json index f7b3630619c..cfcd3410547 100644 --- a/CVE-2016/CVE-2016-28xx/CVE-2016-2800.json +++ b/CVE-2016/CVE-2016-28xx/CVE-2016-2800.json @@ -2,7 +2,7 @@ "id": "CVE-2016-2800", "sourceIdentifier": "security@mozilla.org", "published": "2016-03-13T18:59:39.307", - "lastModified": "2019-12-27T16:08:55.810", + "lastModified": "2024-10-21T13:11:23.977", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -89,6 +89,26 @@ "versionEndIncluding": "44.0.2", "matchCriteriaId": "A2CA2CAD-3088-47C2-AE3A-607E6064E9BE" }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:38.5.0:*:*:*:*:*:*:*", + "matchCriteriaId": "62B4E871-0ACB-4EC5-8392-EAD0DF25E64B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:38.5.1:*:*:*:*:*:*:*", + "matchCriteriaId": "435D6EF5-C879-4121-9D47-EF2236E53409" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:38.6.0:*:*:*:*:*:*:*", + "matchCriteriaId": "A5963D11-D2F4-40A7-81CE-E034C91FCCBD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:38.6.1:*:*:*:*:*:*:*", + "matchCriteriaId": "5FB022A7-B792-4AC0-B2CF-AF6F384AE719" + }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.0:*:*:*:*:*:*:*", @@ -133,26 +153,6 @@ "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "B1F6A91A-4C19-47FB-B538-2B1837F68C61" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.5.0:*:*:*:*:*:*:*", - "matchCriteriaId": "4773E493-5198-48FD-97D3-C20C36DF76E1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.5.1:*:*:*:*:*:*:*", - "matchCriteriaId": "4E8F7CC3-9108-49C5-A0EE-DCC86A949C74" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.6.0:*:*:*:*:*:*:*", - "matchCriteriaId": "97CD0D0C-B3AB-47B2-90DB-D559BFCFC670" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.6.1:*:*:*:*:*:*:*", - "matchCriteriaId": "E8A6B04A-AA56-43F4-835A-86795055A869" } ] } diff --git a/CVE-2016/CVE-2016-28xx/CVE-2016-2801.json b/CVE-2016/CVE-2016-28xx/CVE-2016-2801.json index 1a6bd843285..d4229a12f3b 100644 --- a/CVE-2016/CVE-2016-28xx/CVE-2016-2801.json +++ b/CVE-2016/CVE-2016-28xx/CVE-2016-2801.json @@ -2,7 +2,7 @@ "id": "CVE-2016-2801", "sourceIdentifier": "security@mozilla.org", "published": "2016-03-13T18:59:40.570", - "lastModified": "2019-12-27T16:08:55.810", + "lastModified": "2024-10-21T13:11:23.977", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -160,6 +160,26 @@ "versionEndIncluding": "44.0.2", "matchCriteriaId": "A2CA2CAD-3088-47C2-AE3A-607E6064E9BE" }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:38.5.0:*:*:*:*:*:*:*", + "matchCriteriaId": "62B4E871-0ACB-4EC5-8392-EAD0DF25E64B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:38.5.1:*:*:*:*:*:*:*", + "matchCriteriaId": "435D6EF5-C879-4121-9D47-EF2236E53409" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:38.6.0:*:*:*:*:*:*:*", + "matchCriteriaId": "A5963D11-D2F4-40A7-81CE-E034C91FCCBD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:38.6.1:*:*:*:*:*:*:*", + "matchCriteriaId": "5FB022A7-B792-4AC0-B2CF-AF6F384AE719" + }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.0:*:*:*:*:*:*:*", @@ -204,26 +224,6 @@ "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "B1F6A91A-4C19-47FB-B538-2B1837F68C61" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.5.0:*:*:*:*:*:*:*", - "matchCriteriaId": "4773E493-5198-48FD-97D3-C20C36DF76E1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.5.1:*:*:*:*:*:*:*", - "matchCriteriaId": "4E8F7CC3-9108-49C5-A0EE-DCC86A949C74" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.6.0:*:*:*:*:*:*:*", - "matchCriteriaId": "97CD0D0C-B3AB-47B2-90DB-D559BFCFC670" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.6.1:*:*:*:*:*:*:*", - "matchCriteriaId": "E8A6B04A-AA56-43F4-835A-86795055A869" } ] } diff --git a/CVE-2016/CVE-2016-28xx/CVE-2016-2802.json b/CVE-2016/CVE-2016-28xx/CVE-2016-2802.json index 7f98d651451..6a1dcacc76b 100644 --- a/CVE-2016/CVE-2016-28xx/CVE-2016-2802.json +++ b/CVE-2016/CVE-2016-28xx/CVE-2016-2802.json @@ -2,7 +2,7 @@ "id": "CVE-2016-2802", "sourceIdentifier": "security@mozilla.org", "published": "2016-03-13T18:59:41.650", - "lastModified": "2019-12-27T16:08:55.810", + "lastModified": "2024-10-21T13:11:23.977", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -89,6 +89,26 @@ "versionEndIncluding": "44.0.2", "matchCriteriaId": "A2CA2CAD-3088-47C2-AE3A-607E6064E9BE" }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:38.5.0:*:*:*:*:*:*:*", + "matchCriteriaId": "62B4E871-0ACB-4EC5-8392-EAD0DF25E64B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:38.5.1:*:*:*:*:*:*:*", + "matchCriteriaId": "435D6EF5-C879-4121-9D47-EF2236E53409" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:38.6.0:*:*:*:*:*:*:*", + "matchCriteriaId": "A5963D11-D2F4-40A7-81CE-E034C91FCCBD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:38.6.1:*:*:*:*:*:*:*", + "matchCriteriaId": "5FB022A7-B792-4AC0-B2CF-AF6F384AE719" + }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.0:*:*:*:*:*:*:*", @@ -133,26 +153,6 @@ "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "B1F6A91A-4C19-47FB-B538-2B1837F68C61" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.5.0:*:*:*:*:*:*:*", - "matchCriteriaId": "4773E493-5198-48FD-97D3-C20C36DF76E1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.5.1:*:*:*:*:*:*:*", - "matchCriteriaId": "4E8F7CC3-9108-49C5-A0EE-DCC86A949C74" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.6.0:*:*:*:*:*:*:*", - "matchCriteriaId": "97CD0D0C-B3AB-47B2-90DB-D559BFCFC670" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.6.1:*:*:*:*:*:*:*", - "matchCriteriaId": "E8A6B04A-AA56-43F4-835A-86795055A869" } ] } diff --git a/CVE-2016/CVE-2016-28xx/CVE-2016-2804.json b/CVE-2016/CVE-2016-28xx/CVE-2016-2804.json index ee3fff93854..d312d18a616 100644 --- a/CVE-2016/CVE-2016-28xx/CVE-2016-2804.json +++ b/CVE-2016/CVE-2016-28xx/CVE-2016-2804.json @@ -2,7 +2,7 @@ "id": "CVE-2016-2804", "sourceIdentifier": "security@mozilla.org", "published": "2016-04-30T17:59:00.113", - "lastModified": "2017-07-01T01:29:40.233", + "lastModified": "2024-10-21T13:11:23.977", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -89,6 +89,41 @@ "versionEndIncluding": "45.0.2", "matchCriteriaId": "97000851-C511-487E-A5E8-FCB173D76624" }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:38.5.0:*:*:*:*:*:*:*", + "matchCriteriaId": "62B4E871-0ACB-4EC5-8392-EAD0DF25E64B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:38.5.1:*:*:*:*:*:*:*", + "matchCriteriaId": "435D6EF5-C879-4121-9D47-EF2236E53409" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:38.5.2:*:*:*:*:*:*:*", + "matchCriteriaId": "5F99233D-55EE-474D-9D8A-872D5FD9F3DE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:38.6.0:*:*:*:*:*:*:*", + "matchCriteriaId": "A5963D11-D2F4-40A7-81CE-E034C91FCCBD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:38.6.1:*:*:*:*:*:*:*", + "matchCriteriaId": "5FB022A7-B792-4AC0-B2CF-AF6F384AE719" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:38.7.0:*:*:*:*:*:*:*", + "matchCriteriaId": "1AD923B9-A845-4D1E-A59F-2A0D3D01E4D3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:38.7.1:*:*:*:*:*:*:*", + "matchCriteriaId": "ADBAD0F4-42B5-4A0A-BB0D-08F92C9DF238" + }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.0:*:*:*:*:*:*:*", @@ -133,41 +168,6 @@ "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "B1F6A91A-4C19-47FB-B538-2B1837F68C61" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.5.0:*:*:*:*:*:*:*", - "matchCriteriaId": "4773E493-5198-48FD-97D3-C20C36DF76E1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.5.1:*:*:*:*:*:*:*", - "matchCriteriaId": "4E8F7CC3-9108-49C5-A0EE-DCC86A949C74" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.5.2:*:*:*:*:*:*:*", - "matchCriteriaId": "5189097F-65FA-4F24-89BB-2996A605C9AB" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.6.0:*:*:*:*:*:*:*", - "matchCriteriaId": "97CD0D0C-B3AB-47B2-90DB-D559BFCFC670" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.6.1:*:*:*:*:*:*:*", - "matchCriteriaId": "E8A6B04A-AA56-43F4-835A-86795055A869" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.7.0:*:*:*:*:*:*:*", - "matchCriteriaId": "8D5D79EC-5212-4518-94EA-E4847F8FC4E8" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.7.1:*:*:*:*:*:*:*", - "matchCriteriaId": "87A77FC2-EFB3-44EE-B8DF-44EFE7905CD1" } ] } diff --git a/CVE-2016/CVE-2016-28xx/CVE-2016-2805.json b/CVE-2016/CVE-2016-28xx/CVE-2016-2805.json index e554cae2bc4..00c698aeecc 100644 --- a/CVE-2016/CVE-2016-28xx/CVE-2016-2805.json +++ b/CVE-2016/CVE-2016-28xx/CVE-2016-2805.json @@ -2,7 +2,7 @@ "id": "CVE-2016-2805", "sourceIdentifier": "security@mozilla.org", "published": "2016-04-30T17:59:01.193", - "lastModified": "2017-07-01T01:29:40.297", + "lastModified": "2024-10-21T13:11:23.977", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -83,6 +83,36 @@ "operator": "OR", "negate": false, "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:38.5.0:*:*:*:*:*:*:*", + "matchCriteriaId": "62B4E871-0ACB-4EC5-8392-EAD0DF25E64B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:38.5.1:*:*:*:*:*:*:*", + "matchCriteriaId": "435D6EF5-C879-4121-9D47-EF2236E53409" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:38.6.0:*:*:*:*:*:*:*", + "matchCriteriaId": "A5963D11-D2F4-40A7-81CE-E034C91FCCBD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:38.6.1:*:*:*:*:*:*:*", + "matchCriteriaId": "5FB022A7-B792-4AC0-B2CF-AF6F384AE719" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:38.7.0:*:*:*:*:*:*:*", + "matchCriteriaId": "1AD923B9-A845-4D1E-A59F-2A0D3D01E4D3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:38.7.1:*:*:*:*:*:*:*", + "matchCriteriaId": "ADBAD0F4-42B5-4A0A-BB0D-08F92C9DF238" + }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.0:*:*:*:*:*:*:*", @@ -127,36 +157,6 @@ "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "B1F6A91A-4C19-47FB-B538-2B1837F68C61" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.5.0:*:*:*:*:*:*:*", - "matchCriteriaId": "4773E493-5198-48FD-97D3-C20C36DF76E1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.5.1:*:*:*:*:*:*:*", - "matchCriteriaId": "4E8F7CC3-9108-49C5-A0EE-DCC86A949C74" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.6.0:*:*:*:*:*:*:*", - "matchCriteriaId": "97CD0D0C-B3AB-47B2-90DB-D559BFCFC670" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.6.1:*:*:*:*:*:*:*", - "matchCriteriaId": "E8A6B04A-AA56-43F4-835A-86795055A869" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.7.0:*:*:*:*:*:*:*", - "matchCriteriaId": "8D5D79EC-5212-4518-94EA-E4847F8FC4E8" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.7.1:*:*:*:*:*:*:*", - "matchCriteriaId": "87A77FC2-EFB3-44EE-B8DF-44EFE7905CD1" } ] } diff --git a/CVE-2016/CVE-2016-28xx/CVE-2016-2807.json b/CVE-2016/CVE-2016-28xx/CVE-2016-2807.json index a9dbf51fba8..9f6f16530d6 100644 --- a/CVE-2016/CVE-2016-28xx/CVE-2016-2807.json +++ b/CVE-2016/CVE-2016-28xx/CVE-2016-2807.json @@ -2,7 +2,7 @@ "id": "CVE-2016-2807", "sourceIdentifier": "security@mozilla.org", "published": "2016-04-30T17:59:03.130", - "lastModified": "2018-10-30T16:27:35.843", + "lastModified": "2024-10-21T13:11:23.977", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -89,6 +89,36 @@ "versionEndIncluding": "45.0.2", "matchCriteriaId": "97000851-C511-487E-A5E8-FCB173D76624" }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:38.5.0:*:*:*:*:*:*:*", + "matchCriteriaId": "62B4E871-0ACB-4EC5-8392-EAD0DF25E64B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:38.5.1:*:*:*:*:*:*:*", + "matchCriteriaId": "435D6EF5-C879-4121-9D47-EF2236E53409" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:38.6.0:*:*:*:*:*:*:*", + "matchCriteriaId": "A5963D11-D2F4-40A7-81CE-E034C91FCCBD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:38.6.1:*:*:*:*:*:*:*", + "matchCriteriaId": "5FB022A7-B792-4AC0-B2CF-AF6F384AE719" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:38.7.0:*:*:*:*:*:*:*", + "matchCriteriaId": "1AD923B9-A845-4D1E-A59F-2A0D3D01E4D3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:38.7.1:*:*:*:*:*:*:*", + "matchCriteriaId": "ADBAD0F4-42B5-4A0A-BB0D-08F92C9DF238" + }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox:45.0.1:*:*:*:*:*:*:*", @@ -138,36 +168,6 @@ "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "B1F6A91A-4C19-47FB-B538-2B1837F68C61" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.5.0:*:*:*:*:*:*:*", - "matchCriteriaId": "4773E493-5198-48FD-97D3-C20C36DF76E1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.5.1:*:*:*:*:*:*:*", - "matchCriteriaId": "4E8F7CC3-9108-49C5-A0EE-DCC86A949C74" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.6.0:*:*:*:*:*:*:*", - "matchCriteriaId": "97CD0D0C-B3AB-47B2-90DB-D559BFCFC670" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.6.1:*:*:*:*:*:*:*", - "matchCriteriaId": "E8A6B04A-AA56-43F4-835A-86795055A869" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.7.0:*:*:*:*:*:*:*", - "matchCriteriaId": "8D5D79EC-5212-4518-94EA-E4847F8FC4E8" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.7.1:*:*:*:*:*:*:*", - "matchCriteriaId": "87A77FC2-EFB3-44EE-B8DF-44EFE7905CD1" } ] } diff --git a/CVE-2016/CVE-2016-28xx/CVE-2016-2808.json b/CVE-2016/CVE-2016-28xx/CVE-2016-2808.json index 9b74ff24920..adf8fd85fe3 100644 --- a/CVE-2016/CVE-2016-28xx/CVE-2016-2808.json +++ b/CVE-2016/CVE-2016-28xx/CVE-2016-2808.json @@ -2,7 +2,7 @@ "id": "CVE-2016-2808", "sourceIdentifier": "security@mozilla.org", "published": "2016-04-30T17:59:04.710", - "lastModified": "2017-07-01T01:29:40.517", + "lastModified": "2024-10-21T13:11:23.977", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -89,6 +89,36 @@ "versionEndIncluding": "45.0.2", "matchCriteriaId": "97000851-C511-487E-A5E8-FCB173D76624" }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:38.5.0:*:*:*:*:*:*:*", + "matchCriteriaId": "62B4E871-0ACB-4EC5-8392-EAD0DF25E64B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:38.5.1:*:*:*:*:*:*:*", + "matchCriteriaId": "435D6EF5-C879-4121-9D47-EF2236E53409" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:38.6.0:*:*:*:*:*:*:*", + "matchCriteriaId": "A5963D11-D2F4-40A7-81CE-E034C91FCCBD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:38.6.1:*:*:*:*:*:*:*", + "matchCriteriaId": "5FB022A7-B792-4AC0-B2CF-AF6F384AE719" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:38.7.0:*:*:*:*:*:*:*", + "matchCriteriaId": "1AD923B9-A845-4D1E-A59F-2A0D3D01E4D3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:38.7.1:*:*:*:*:*:*:*", + "matchCriteriaId": "ADBAD0F4-42B5-4A0A-BB0D-08F92C9DF238" + }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox:45.0.1:*:*:*:*:*:*:*", @@ -138,36 +168,6 @@ "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "B1F6A91A-4C19-47FB-B538-2B1837F68C61" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.5.0:*:*:*:*:*:*:*", - "matchCriteriaId": "4773E493-5198-48FD-97D3-C20C36DF76E1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.5.1:*:*:*:*:*:*:*", - "matchCriteriaId": "4E8F7CC3-9108-49C5-A0EE-DCC86A949C74" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.6.0:*:*:*:*:*:*:*", - "matchCriteriaId": "97CD0D0C-B3AB-47B2-90DB-D559BFCFC670" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.6.1:*:*:*:*:*:*:*", - "matchCriteriaId": "E8A6B04A-AA56-43F4-835A-86795055A869" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.7.0:*:*:*:*:*:*:*", - "matchCriteriaId": "8D5D79EC-5212-4518-94EA-E4847F8FC4E8" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.7.1:*:*:*:*:*:*:*", - "matchCriteriaId": "87A77FC2-EFB3-44EE-B8DF-44EFE7905CD1" } ] } diff --git a/CVE-2016/CVE-2016-28xx/CVE-2016-2814.json b/CVE-2016/CVE-2016-28xx/CVE-2016-2814.json index 5fa3423f325..56d2c788217 100644 --- a/CVE-2016/CVE-2016-28xx/CVE-2016-2814.json +++ b/CVE-2016/CVE-2016-28xx/CVE-2016-2814.json @@ -2,7 +2,7 @@ "id": "CVE-2016-2814", "sourceIdentifier": "security@mozilla.org", "published": "2016-04-30T17:59:12.447", - "lastModified": "2017-07-01T01:29:40.827", + "lastModified": "2024-10-21T13:11:23.977", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -89,6 +89,36 @@ "versionEndIncluding": "45.0.2", "matchCriteriaId": "97000851-C511-487E-A5E8-FCB173D76624" }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:38.5.0:*:*:*:*:*:*:*", + "matchCriteriaId": "62B4E871-0ACB-4EC5-8392-EAD0DF25E64B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:38.5.1:*:*:*:*:*:*:*", + "matchCriteriaId": "435D6EF5-C879-4121-9D47-EF2236E53409" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:38.6.0:*:*:*:*:*:*:*", + "matchCriteriaId": "A5963D11-D2F4-40A7-81CE-E034C91FCCBD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:38.6.1:*:*:*:*:*:*:*", + "matchCriteriaId": "5FB022A7-B792-4AC0-B2CF-AF6F384AE719" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:38.7.0:*:*:*:*:*:*:*", + "matchCriteriaId": "1AD923B9-A845-4D1E-A59F-2A0D3D01E4D3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:38.7.1:*:*:*:*:*:*:*", + "matchCriteriaId": "ADBAD0F4-42B5-4A0A-BB0D-08F92C9DF238" + }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox:45.0.1:*:*:*:*:*:*:*", @@ -138,36 +168,6 @@ "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "B1F6A91A-4C19-47FB-B538-2B1837F68C61" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.5.0:*:*:*:*:*:*:*", - "matchCriteriaId": "4773E493-5198-48FD-97D3-C20C36DF76E1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.5.1:*:*:*:*:*:*:*", - "matchCriteriaId": "4E8F7CC3-9108-49C5-A0EE-DCC86A949C74" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.6.0:*:*:*:*:*:*:*", - "matchCriteriaId": "97CD0D0C-B3AB-47B2-90DB-D559BFCFC670" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.6.1:*:*:*:*:*:*:*", - "matchCriteriaId": "E8A6B04A-AA56-43F4-835A-86795055A869" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.7.0:*:*:*:*:*:*:*", - "matchCriteriaId": "8D5D79EC-5212-4518-94EA-E4847F8FC4E8" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:38.7.1:*:*:*:*:*:*:*", - "matchCriteriaId": "87A77FC2-EFB3-44EE-B8DF-44EFE7905CD1" } ] } diff --git a/CVE-2016/CVE-2016-28xx/CVE-2016-2818.json b/CVE-2016/CVE-2016-28xx/CVE-2016-2818.json index bdb4610a3a2..dcbcc25fc1b 100644 --- a/CVE-2016/CVE-2016-28xx/CVE-2016-2818.json +++ b/CVE-2016/CVE-2016-28xx/CVE-2016-2818.json @@ -2,7 +2,7 @@ "id": "CVE-2016-2818", "sourceIdentifier": "security@mozilla.org", "published": "2016-06-13T10:59:01.540", - "lastModified": "2023-09-12T14:55:31.563", + "lastModified": "2024-10-21T13:11:23.977", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -85,13 +85,13 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:45.1.0:*:*:*:*:*:*:*", - "matchCriteriaId": "B877383B-F7B3-433F-B7B0-2B1C731504F2" + "criteria": "cpe:2.3:a:mozilla:firefox:45.1.1:*:*:*:*:*:*:*", + "matchCriteriaId": "1E084D09-97BE-43E1-94D1-05206E513B99" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:45.1.1:*:*:*:*:*:*:*", - "matchCriteriaId": "4F18C6F4-5C04-4E4B-A2CC-29C5338F0CD1" + "criteria": "cpe:2.3:a:mozilla:firefox_esr:45.1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "B877383B-F7B3-433F-B7B0-2B1C731504F2" } ] } diff --git a/CVE-2016/CVE-2016-28xx/CVE-2016-2819.json b/CVE-2016/CVE-2016-28xx/CVE-2016-2819.json index 5791fcadfe6..ca3670aebae 100644 --- a/CVE-2016/CVE-2016-28xx/CVE-2016-2819.json +++ b/CVE-2016/CVE-2016-28xx/CVE-2016-2819.json @@ -2,7 +2,7 @@ "id": "CVE-2016-2819", "sourceIdentifier": "security@mozilla.org", "published": "2016-06-13T10:59:03.073", - "lastModified": "2018-10-30T16:27:35.843", + "lastModified": "2024-10-21T13:11:23.977", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -110,13 +110,13 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:45.1.0:*:*:*:*:*:*:*", - "matchCriteriaId": "B877383B-F7B3-433F-B7B0-2B1C731504F2" + "criteria": "cpe:2.3:a:mozilla:firefox:45.1.1:*:*:*:*:*:*:*", + "matchCriteriaId": "1E084D09-97BE-43E1-94D1-05206E513B99" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:45.1.1:*:*:*:*:*:*:*", - "matchCriteriaId": "4F18C6F4-5C04-4E4B-A2CC-29C5338F0CD1" + "criteria": "cpe:2.3:a:mozilla:firefox_esr:45.1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "B877383B-F7B3-433F-B7B0-2B1C731504F2" } ] } diff --git a/CVE-2016/CVE-2016-28xx/CVE-2016-2821.json b/CVE-2016/CVE-2016-28xx/CVE-2016-2821.json index dd65b1700e1..796c3cd6774 100644 --- a/CVE-2016/CVE-2016-28xx/CVE-2016-2821.json +++ b/CVE-2016/CVE-2016-28xx/CVE-2016-2821.json @@ -2,7 +2,7 @@ "id": "CVE-2016-2821", "sourceIdentifier": "security@mozilla.org", "published": "2016-06-13T10:59:04.370", - "lastModified": "2018-10-30T16:27:35.843", + "lastModified": "2024-10-21T13:11:23.977", "vulnStatus": "Modified", "cveTags": [], "evaluatorComment": "CWE-416: Use After Free", @@ -102,13 +102,13 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:45.1.0:*:*:*:*:*:*:*", - "matchCriteriaId": "B877383B-F7B3-433F-B7B0-2B1C731504F2" + "criteria": "cpe:2.3:a:mozilla:firefox:45.1.1:*:*:*:*:*:*:*", + "matchCriteriaId": "1E084D09-97BE-43E1-94D1-05206E513B99" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:45.1.1:*:*:*:*:*:*:*", - "matchCriteriaId": "4F18C6F4-5C04-4E4B-A2CC-29C5338F0CD1" + "criteria": "cpe:2.3:a:mozilla:firefox_esr:45.1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "B877383B-F7B3-433F-B7B0-2B1C731504F2" } ] } diff --git a/CVE-2016/CVE-2016-28xx/CVE-2016-2822.json b/CVE-2016/CVE-2016-28xx/CVE-2016-2822.json index b08c5e30eba..3b1a66e7d8d 100644 --- a/CVE-2016/CVE-2016-28xx/CVE-2016-2822.json +++ b/CVE-2016/CVE-2016-28xx/CVE-2016-2822.json @@ -2,7 +2,7 @@ "id": "CVE-2016-2822", "sourceIdentifier": "security@mozilla.org", "published": "2016-06-13T10:59:05.587", - "lastModified": "2018-10-30T16:27:35.843", + "lastModified": "2024-10-21T13:11:23.977", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -100,13 +100,13 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:45.1.0:*:*:*:*:*:*:*", - "matchCriteriaId": "B877383B-F7B3-433F-B7B0-2B1C731504F2" + "criteria": "cpe:2.3:a:mozilla:firefox:45.1.1:*:*:*:*:*:*:*", + "matchCriteriaId": "1E084D09-97BE-43E1-94D1-05206E513B99" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:45.1.1:*:*:*:*:*:*:*", - "matchCriteriaId": "4F18C6F4-5C04-4E4B-A2CC-29C5338F0CD1" + "criteria": "cpe:2.3:a:mozilla:firefox_esr:45.1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "B877383B-F7B3-433F-B7B0-2B1C731504F2" } ] } diff --git a/CVE-2016/CVE-2016-28xx/CVE-2016-2824.json b/CVE-2016/CVE-2016-28xx/CVE-2016-2824.json index 38c3493989c..0cd53d0d6b7 100644 --- a/CVE-2016/CVE-2016-28xx/CVE-2016-2824.json +++ b/CVE-2016/CVE-2016-28xx/CVE-2016-2824.json @@ -2,7 +2,7 @@ "id": "CVE-2016-2824", "sourceIdentifier": "security@mozilla.org", "published": "2016-06-13T10:59:06.637", - "lastModified": "2018-10-30T16:27:35.843", + "lastModified": "2024-10-21T13:11:23.977", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -97,13 +97,13 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:45.1.0:*:*:*:*:*:*:*", - "matchCriteriaId": "B877383B-F7B3-433F-B7B0-2B1C731504F2" + "criteria": "cpe:2.3:a:mozilla:firefox:45.1.1:*:*:*:*:*:*:*", + "matchCriteriaId": "1E084D09-97BE-43E1-94D1-05206E513B99" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:45.1.1:*:*:*:*:*:*:*", - "matchCriteriaId": "4F18C6F4-5C04-4E4B-A2CC-29C5338F0CD1" + "criteria": "cpe:2.3:a:mozilla:firefox_esr:45.1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "B877383B-F7B3-433F-B7B0-2B1C731504F2" } ] } diff --git a/CVE-2016/CVE-2016-28xx/CVE-2016-2826.json b/CVE-2016/CVE-2016-28xx/CVE-2016-2826.json index 27fdef4df59..91f55af33ff 100644 --- a/CVE-2016/CVE-2016-28xx/CVE-2016-2826.json +++ b/CVE-2016/CVE-2016-28xx/CVE-2016-2826.json @@ -2,7 +2,7 @@ "id": "CVE-2016-2826", "sourceIdentifier": "security@mozilla.org", "published": "2016-06-13T10:59:09.150", - "lastModified": "2016-11-28T20:04:56.587", + "lastModified": "2024-10-21T13:11:23.977", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -97,13 +97,13 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:45.1.0:*:*:*:*:*:*:*", - "matchCriteriaId": "B877383B-F7B3-433F-B7B0-2B1C731504F2" + "criteria": "cpe:2.3:a:mozilla:firefox:45.1.1:*:*:*:*:*:*:*", + "matchCriteriaId": "1E084D09-97BE-43E1-94D1-05206E513B99" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:45.1.1:*:*:*:*:*:*:*", - "matchCriteriaId": "4F18C6F4-5C04-4E4B-A2CC-29C5338F0CD1" + "criteria": "cpe:2.3:a:mozilla:firefox_esr:45.1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "B877383B-F7B3-433F-B7B0-2B1C731504F2" } ] } diff --git a/CVE-2016/CVE-2016-28xx/CVE-2016-2828.json b/CVE-2016/CVE-2016-28xx/CVE-2016-2828.json index e4574b00a6d..6dc997d6d82 100644 --- a/CVE-2016/CVE-2016-28xx/CVE-2016-2828.json +++ b/CVE-2016/CVE-2016-28xx/CVE-2016-2828.json @@ -2,7 +2,7 @@ "id": "CVE-2016-2828", "sourceIdentifier": "security@mozilla.org", "published": "2016-06-13T10:59:10.137", - "lastModified": "2018-10-30T16:27:35.843", + "lastModified": "2024-10-21T13:11:23.977", "vulnStatus": "Modified", "cveTags": [], "evaluatorComment": "CWE-416: Use After Free", @@ -157,13 +157,13 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:45.1.0:*:*:*:*:*:*:*", - "matchCriteriaId": "B877383B-F7B3-433F-B7B0-2B1C731504F2" + "criteria": "cpe:2.3:a:mozilla:firefox:45.1.1:*:*:*:*:*:*:*", + "matchCriteriaId": "1E084D09-97BE-43E1-94D1-05206E513B99" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:45.1.1:*:*:*:*:*:*:*", - "matchCriteriaId": "4F18C6F4-5C04-4E4B-A2CC-29C5338F0CD1" + "criteria": "cpe:2.3:a:mozilla:firefox_esr:45.1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "B877383B-F7B3-433F-B7B0-2B1C731504F2" } ] } diff --git a/CVE-2016/CVE-2016-28xx/CVE-2016-2830.json b/CVE-2016/CVE-2016-28xx/CVE-2016-2830.json index abc120c4450..8c4f767233b 100644 --- a/CVE-2016/CVE-2016-28xx/CVE-2016-2830.json +++ b/CVE-2016/CVE-2016-28xx/CVE-2016-2830.json @@ -2,7 +2,7 @@ "id": "CVE-2016-2830", "sourceIdentifier": "security@mozilla.org", "published": "2016-08-05T01:59:00.140", - "lastModified": "2017-08-16T01:29:06.337", + "lastModified": "2024-10-21T13:11:23.977", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -89,25 +89,25 @@ "versionEndIncluding": "47.0.1", "matchCriteriaId": "1456CC69-6E37-4C75-8D9A-172ED8A571EB" }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:45.1.1:*:*:*:*:*:*:*", + "matchCriteriaId": "1E084D09-97BE-43E1-94D1-05206E513B99" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:45.2.0:*:*:*:*:*:*:*", + "matchCriteriaId": "915E92FE-8049-4EA5-95B8-F3EA25F78546" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:45.3.0:*:*:*:*:*:*:*", + "matchCriteriaId": "CA9E7A47-5E77-4736-920A-93283E30DC7C" + }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:45.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "B877383B-F7B3-433F-B7B0-2B1C731504F2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:45.1.1:*:*:*:*:*:*:*", - "matchCriteriaId": "4F18C6F4-5C04-4E4B-A2CC-29C5338F0CD1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:45.2.0:*:*:*:*:*:*:*", - "matchCriteriaId": "BD9B460C-3328-44DC-AA80-EDE2E46AF787" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:45.3.0:*:*:*:*:*:*:*", - "matchCriteriaId": "BD5D9DC4-4D18-4491-BE90-CAE21CA1AA96" } ] } diff --git a/CVE-2016/CVE-2016-28xx/CVE-2016-2831.json b/CVE-2016/CVE-2016-28xx/CVE-2016-2831.json index ca7e9c24f32..53fcd7fbdd8 100644 --- a/CVE-2016/CVE-2016-28xx/CVE-2016-2831.json +++ b/CVE-2016/CVE-2016-28xx/CVE-2016-2831.json @@ -2,7 +2,7 @@ "id": "CVE-2016-2831", "sourceIdentifier": "security@mozilla.org", "published": "2016-06-13T10:59:12.197", - "lastModified": "2018-10-30T16:27:35.843", + "lastModified": "2024-10-21T13:11:23.977", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -119,13 +119,13 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:45.1.0:*:*:*:*:*:*:*", - "matchCriteriaId": "B877383B-F7B3-433F-B7B0-2B1C731504F2" + "criteria": "cpe:2.3:a:mozilla:firefox:45.1.1:*:*:*:*:*:*:*", + "matchCriteriaId": "1E084D09-97BE-43E1-94D1-05206E513B99" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:45.1.1:*:*:*:*:*:*:*", - "matchCriteriaId": "4F18C6F4-5C04-4E4B-A2CC-29C5338F0CD1" + "criteria": "cpe:2.3:a:mozilla:firefox_esr:45.1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "B877383B-F7B3-433F-B7B0-2B1C731504F2" } ] } diff --git a/CVE-2016/CVE-2016-28xx/CVE-2016-2836.json b/CVE-2016/CVE-2016-28xx/CVE-2016-2836.json index 796bc8287fb..1e14da24b79 100644 --- a/CVE-2016/CVE-2016-28xx/CVE-2016-2836.json +++ b/CVE-2016/CVE-2016-28xx/CVE-2016-2836.json @@ -2,7 +2,7 @@ "id": "CVE-2016-2836", "sourceIdentifier": "security@mozilla.org", "published": "2016-08-05T01:59:02.500", - "lastModified": "2017-08-16T01:29:06.477", + "lastModified": "2024-10-21T13:11:23.977", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -89,25 +89,25 @@ "versionEndIncluding": "47.0.1", "matchCriteriaId": "1456CC69-6E37-4C75-8D9A-172ED8A571EB" }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:45.1.1:*:*:*:*:*:*:*", + "matchCriteriaId": "1E084D09-97BE-43E1-94D1-05206E513B99" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:45.2.0:*:*:*:*:*:*:*", + "matchCriteriaId": "915E92FE-8049-4EA5-95B8-F3EA25F78546" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:45.3.0:*:*:*:*:*:*:*", + "matchCriteriaId": "CA9E7A47-5E77-4736-920A-93283E30DC7C" + }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:45.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "B877383B-F7B3-433F-B7B0-2B1C731504F2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:45.1.1:*:*:*:*:*:*:*", - "matchCriteriaId": "4F18C6F4-5C04-4E4B-A2CC-29C5338F0CD1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:45.2.0:*:*:*:*:*:*:*", - "matchCriteriaId": "BD9B460C-3328-44DC-AA80-EDE2E46AF787" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:45.3.0:*:*:*:*:*:*:*", - "matchCriteriaId": "BD5D9DC4-4D18-4491-BE90-CAE21CA1AA96" } ] } diff --git a/CVE-2016/CVE-2016-28xx/CVE-2016-2837.json b/CVE-2016/CVE-2016-28xx/CVE-2016-2837.json index 59c9ebc0a6a..b117cf21fd4 100644 --- a/CVE-2016/CVE-2016-28xx/CVE-2016-2837.json +++ b/CVE-2016/CVE-2016-28xx/CVE-2016-2837.json @@ -2,7 +2,7 @@ "id": "CVE-2016-2837", "sourceIdentifier": "security@mozilla.org", "published": "2016-08-05T01:59:03.673", - "lastModified": "2019-12-27T16:08:55.810", + "lastModified": "2024-10-21T13:11:23.977", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -89,25 +89,25 @@ "versionEndIncluding": "47.0.1", "matchCriteriaId": "1456CC69-6E37-4C75-8D9A-172ED8A571EB" }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:45.1.1:*:*:*:*:*:*:*", + "matchCriteriaId": "1E084D09-97BE-43E1-94D1-05206E513B99" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:45.2.0:*:*:*:*:*:*:*", + "matchCriteriaId": "915E92FE-8049-4EA5-95B8-F3EA25F78546" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:45.3.0:*:*:*:*:*:*:*", + "matchCriteriaId": "CA9E7A47-5E77-4736-920A-93283E30DC7C" + }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:45.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "B877383B-F7B3-433F-B7B0-2B1C731504F2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:45.1.1:*:*:*:*:*:*:*", - "matchCriteriaId": "4F18C6F4-5C04-4E4B-A2CC-29C5338F0CD1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:45.2.0:*:*:*:*:*:*:*", - "matchCriteriaId": "BD9B460C-3328-44DC-AA80-EDE2E46AF787" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:45.3.0:*:*:*:*:*:*:*", - "matchCriteriaId": "BD5D9DC4-4D18-4491-BE90-CAE21CA1AA96" } ] } diff --git a/CVE-2016/CVE-2016-28xx/CVE-2016-2838.json b/CVE-2016/CVE-2016-28xx/CVE-2016-2838.json index e51defe0d4e..3814f47fe73 100644 --- a/CVE-2016/CVE-2016-28xx/CVE-2016-2838.json +++ b/CVE-2016/CVE-2016-28xx/CVE-2016-2838.json @@ -2,7 +2,7 @@ "id": "CVE-2016-2838", "sourceIdentifier": "security@mozilla.org", "published": "2016-08-05T01:59:04.813", - "lastModified": "2017-08-16T01:29:06.633", + "lastModified": "2024-10-21T13:11:23.977", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -89,25 +89,25 @@ "versionEndIncluding": "47.0.1", "matchCriteriaId": "1456CC69-6E37-4C75-8D9A-172ED8A571EB" }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:45.1.1:*:*:*:*:*:*:*", + "matchCriteriaId": "1E084D09-97BE-43E1-94D1-05206E513B99" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:45.2.0:*:*:*:*:*:*:*", + "matchCriteriaId": "915E92FE-8049-4EA5-95B8-F3EA25F78546" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:45.3.0:*:*:*:*:*:*:*", + "matchCriteriaId": "CA9E7A47-5E77-4736-920A-93283E30DC7C" + }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:45.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "B877383B-F7B3-433F-B7B0-2B1C731504F2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:45.1.1:*:*:*:*:*:*:*", - "matchCriteriaId": "4F18C6F4-5C04-4E4B-A2CC-29C5338F0CD1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:45.2.0:*:*:*:*:*:*:*", - "matchCriteriaId": "BD9B460C-3328-44DC-AA80-EDE2E46AF787" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:45.3.0:*:*:*:*:*:*:*", - "matchCriteriaId": "BD5D9DC4-4D18-4491-BE90-CAE21CA1AA96" } ] } diff --git a/CVE-2016/CVE-2016-28xx/CVE-2016-2839.json b/CVE-2016/CVE-2016-28xx/CVE-2016-2839.json index 8e4b1970f0b..2e73d22253d 100644 --- a/CVE-2016/CVE-2016-28xx/CVE-2016-2839.json +++ b/CVE-2016/CVE-2016-28xx/CVE-2016-2839.json @@ -2,7 +2,7 @@ "id": "CVE-2016-2839", "sourceIdentifier": "security@mozilla.org", "published": "2016-08-05T01:59:06.033", - "lastModified": "2017-08-16T01:29:06.697", + "lastModified": "2024-10-21T13:11:23.977", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -112,25 +112,25 @@ "versionEndIncluding": "47.0.1", "matchCriteriaId": "1456CC69-6E37-4C75-8D9A-172ED8A571EB" }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:45.1.1:*:*:*:*:*:*:*", + "matchCriteriaId": "1E084D09-97BE-43E1-94D1-05206E513B99" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:45.2.0:*:*:*:*:*:*:*", + "matchCriteriaId": "915E92FE-8049-4EA5-95B8-F3EA25F78546" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:45.3.0:*:*:*:*:*:*:*", + "matchCriteriaId": "CA9E7A47-5E77-4736-920A-93283E30DC7C" + }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:45.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "B877383B-F7B3-433F-B7B0-2B1C731504F2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:45.1.1:*:*:*:*:*:*:*", - "matchCriteriaId": "4F18C6F4-5C04-4E4B-A2CC-29C5338F0CD1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:45.2.0:*:*:*:*:*:*:*", - "matchCriteriaId": "BD9B460C-3328-44DC-AA80-EDE2E46AF787" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:45.3.0:*:*:*:*:*:*:*", - "matchCriteriaId": "BD5D9DC4-4D18-4491-BE90-CAE21CA1AA96" } ] } diff --git a/CVE-2016/CVE-2016-52xx/CVE-2016-5252.json b/CVE-2016/CVE-2016-52xx/CVE-2016-5252.json index 15c8dedff29..4f7c9e5375d 100644 --- a/CVE-2016/CVE-2016-52xx/CVE-2016-5252.json +++ b/CVE-2016/CVE-2016-52xx/CVE-2016-5252.json @@ -2,7 +2,7 @@ "id": "CVE-2016-5252", "sourceIdentifier": "security@mozilla.org", "published": "2016-08-05T01:59:09.767", - "lastModified": "2019-12-27T16:08:55.810", + "lastModified": "2024-10-21T13:11:23.977", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -114,25 +114,25 @@ "versionEndIncluding": "47.0.1", "matchCriteriaId": "1456CC69-6E37-4C75-8D9A-172ED8A571EB" }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:45.1.1:*:*:*:*:*:*:*", + "matchCriteriaId": "1E084D09-97BE-43E1-94D1-05206E513B99" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:45.2.0:*:*:*:*:*:*:*", + "matchCriteriaId": "915E92FE-8049-4EA5-95B8-F3EA25F78546" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:45.3.0:*:*:*:*:*:*:*", + "matchCriteriaId": "CA9E7A47-5E77-4736-920A-93283E30DC7C" + }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:45.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "B877383B-F7B3-433F-B7B0-2B1C731504F2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:45.1.1:*:*:*:*:*:*:*", - "matchCriteriaId": "4F18C6F4-5C04-4E4B-A2CC-29C5338F0CD1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:45.2.0:*:*:*:*:*:*:*", - "matchCriteriaId": "BD9B460C-3328-44DC-AA80-EDE2E46AF787" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:45.3.0:*:*:*:*:*:*:*", - "matchCriteriaId": "BD5D9DC4-4D18-4491-BE90-CAE21CA1AA96" } ] } diff --git a/CVE-2016/CVE-2016-52xx/CVE-2016-5254.json b/CVE-2016/CVE-2016-52xx/CVE-2016-5254.json index b1ff67ddf74..21ebf82ba49 100644 --- a/CVE-2016/CVE-2016-52xx/CVE-2016-5254.json +++ b/CVE-2016/CVE-2016-52xx/CVE-2016-5254.json @@ -2,7 +2,7 @@ "id": "CVE-2016-5254", "sourceIdentifier": "security@mozilla.org", "published": "2016-08-05T01:59:12.017", - "lastModified": "2019-12-27T16:08:55.810", + "lastModified": "2024-10-21T13:11:23.977", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -89,25 +89,25 @@ "versionEndIncluding": "47.0.1", "matchCriteriaId": "1456CC69-6E37-4C75-8D9A-172ED8A571EB" }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:45.1.1:*:*:*:*:*:*:*", + "matchCriteriaId": "1E084D09-97BE-43E1-94D1-05206E513B99" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:45.2.0:*:*:*:*:*:*:*", + "matchCriteriaId": "915E92FE-8049-4EA5-95B8-F3EA25F78546" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:45.3.0:*:*:*:*:*:*:*", + "matchCriteriaId": "CA9E7A47-5E77-4736-920A-93283E30DC7C" + }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:45.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "B877383B-F7B3-433F-B7B0-2B1C731504F2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:45.1.1:*:*:*:*:*:*:*", - "matchCriteriaId": "4F18C6F4-5C04-4E4B-A2CC-29C5338F0CD1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:45.2.0:*:*:*:*:*:*:*", - "matchCriteriaId": "BD9B460C-3328-44DC-AA80-EDE2E46AF787" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:45.3.0:*:*:*:*:*:*:*", - "matchCriteriaId": "BD5D9DC4-4D18-4491-BE90-CAE21CA1AA96" } ] } diff --git a/CVE-2016/CVE-2016-52xx/CVE-2016-5257.json b/CVE-2016/CVE-2016-52xx/CVE-2016-5257.json index 2d9a1f1bad7..59d03028119 100644 --- a/CVE-2016/CVE-2016-52xx/CVE-2016-5257.json +++ b/CVE-2016/CVE-2016-52xx/CVE-2016-5257.json @@ -2,7 +2,7 @@ "id": "CVE-2016-5257", "sourceIdentifier": "security@mozilla.org", "published": "2016-09-22T22:59:02.647", - "lastModified": "2018-06-12T01:29:00.597", + "lastModified": "2024-10-21T13:11:23.977", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -89,25 +89,25 @@ "versionEndIncluding": "48.0.2", "matchCriteriaId": "C56407AD-F303-4E6E-A64E-4AFA23BFB739" }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:45.1.1:*:*:*:*:*:*:*", + "matchCriteriaId": "1E084D09-97BE-43E1-94D1-05206E513B99" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:45.2.0:*:*:*:*:*:*:*", + "matchCriteriaId": "915E92FE-8049-4EA5-95B8-F3EA25F78546" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:45.3.0:*:*:*:*:*:*:*", + "matchCriteriaId": "CA9E7A47-5E77-4736-920A-93283E30DC7C" + }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:45.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "B877383B-F7B3-433F-B7B0-2B1C731504F2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:45.1.1:*:*:*:*:*:*:*", - "matchCriteriaId": "4F18C6F4-5C04-4E4B-A2CC-29C5338F0CD1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:45.2.0:*:*:*:*:*:*:*", - "matchCriteriaId": "BD9B460C-3328-44DC-AA80-EDE2E46AF787" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:45.3.0:*:*:*:*:*:*:*", - "matchCriteriaId": "BD5D9DC4-4D18-4491-BE90-CAE21CA1AA96" } ] } diff --git a/CVE-2016/CVE-2016-52xx/CVE-2016-5258.json b/CVE-2016/CVE-2016-52xx/CVE-2016-5258.json index 132f879d7e9..a9502cbbbe1 100644 --- a/CVE-2016/CVE-2016-52xx/CVE-2016-5258.json +++ b/CVE-2016/CVE-2016-52xx/CVE-2016-5258.json @@ -2,7 +2,7 @@ "id": "CVE-2016-5258", "sourceIdentifier": "security@mozilla.org", "published": "2016-08-05T01:59:14.063", - "lastModified": "2019-12-27T16:08:55.810", + "lastModified": "2024-10-21T13:11:23.977", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -114,25 +114,25 @@ "versionEndIncluding": "47.0.1", "matchCriteriaId": "1456CC69-6E37-4C75-8D9A-172ED8A571EB" }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:45.1.1:*:*:*:*:*:*:*", + "matchCriteriaId": "1E084D09-97BE-43E1-94D1-05206E513B99" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:45.2.0:*:*:*:*:*:*:*", + "matchCriteriaId": "915E92FE-8049-4EA5-95B8-F3EA25F78546" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:45.3.0:*:*:*:*:*:*:*", + "matchCriteriaId": "CA9E7A47-5E77-4736-920A-93283E30DC7C" + }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:45.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "B877383B-F7B3-433F-B7B0-2B1C731504F2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:45.1.1:*:*:*:*:*:*:*", - "matchCriteriaId": "4F18C6F4-5C04-4E4B-A2CC-29C5338F0CD1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:45.2.0:*:*:*:*:*:*:*", - "matchCriteriaId": "BD9B460C-3328-44DC-AA80-EDE2E46AF787" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:45.3.0:*:*:*:*:*:*:*", - "matchCriteriaId": "BD5D9DC4-4D18-4491-BE90-CAE21CA1AA96" } ] } diff --git a/CVE-2016/CVE-2016-52xx/CVE-2016-5259.json b/CVE-2016/CVE-2016-52xx/CVE-2016-5259.json index 86034293840..71373c00779 100644 --- a/CVE-2016/CVE-2016-52xx/CVE-2016-5259.json +++ b/CVE-2016/CVE-2016-52xx/CVE-2016-5259.json @@ -2,7 +2,7 @@ "id": "CVE-2016-5259", "sourceIdentifier": "security@mozilla.org", "published": "2016-08-05T01:59:15.097", - "lastModified": "2019-12-27T16:08:55.810", + "lastModified": "2024-10-21T13:11:23.977", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -89,25 +89,25 @@ "versionEndIncluding": "47.0.1", "matchCriteriaId": "1456CC69-6E37-4C75-8D9A-172ED8A571EB" }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:45.1.1:*:*:*:*:*:*:*", + "matchCriteriaId": "1E084D09-97BE-43E1-94D1-05206E513B99" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:45.2.0:*:*:*:*:*:*:*", + "matchCriteriaId": "915E92FE-8049-4EA5-95B8-F3EA25F78546" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:45.3.0:*:*:*:*:*:*:*", + "matchCriteriaId": "CA9E7A47-5E77-4736-920A-93283E30DC7C" + }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:45.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "B877383B-F7B3-433F-B7B0-2B1C731504F2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:45.1.1:*:*:*:*:*:*:*", - "matchCriteriaId": "4F18C6F4-5C04-4E4B-A2CC-29C5338F0CD1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:45.2.0:*:*:*:*:*:*:*", - "matchCriteriaId": "BD9B460C-3328-44DC-AA80-EDE2E46AF787" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:45.3.0:*:*:*:*:*:*:*", - "matchCriteriaId": "BD5D9DC4-4D18-4491-BE90-CAE21CA1AA96" } ] } diff --git a/CVE-2016/CVE-2016-52xx/CVE-2016-5262.json b/CVE-2016/CVE-2016-52xx/CVE-2016-5262.json index 32bc1c2eff6..cdb6a83f0cf 100644 --- a/CVE-2016/CVE-2016-52xx/CVE-2016-5262.json +++ b/CVE-2016/CVE-2016-52xx/CVE-2016-5262.json @@ -2,7 +2,7 @@ "id": "CVE-2016-5262", "sourceIdentifier": "security@mozilla.org", "published": "2016-08-05T01:59:18.207", - "lastModified": "2019-12-27T16:08:55.810", + "lastModified": "2024-10-21T13:11:23.977", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -89,25 +89,25 @@ "versionEndIncluding": "47.0.1", "matchCriteriaId": "1456CC69-6E37-4C75-8D9A-172ED8A571EB" }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:45.1.1:*:*:*:*:*:*:*", + "matchCriteriaId": "1E084D09-97BE-43E1-94D1-05206E513B99" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:45.2.0:*:*:*:*:*:*:*", + "matchCriteriaId": "915E92FE-8049-4EA5-95B8-F3EA25F78546" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:45.3.0:*:*:*:*:*:*:*", + "matchCriteriaId": "CA9E7A47-5E77-4736-920A-93283E30DC7C" + }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:45.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "B877383B-F7B3-433F-B7B0-2B1C731504F2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:45.1.1:*:*:*:*:*:*:*", - "matchCriteriaId": "4F18C6F4-5C04-4E4B-A2CC-29C5338F0CD1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:45.2.0:*:*:*:*:*:*:*", - "matchCriteriaId": "BD9B460C-3328-44DC-AA80-EDE2E46AF787" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:45.3.0:*:*:*:*:*:*:*", - "matchCriteriaId": "BD5D9DC4-4D18-4491-BE90-CAE21CA1AA96" } ] } diff --git a/CVE-2016/CVE-2016-52xx/CVE-2016-5263.json b/CVE-2016/CVE-2016-52xx/CVE-2016-5263.json index 0c5e540b33a..2b37e559d2f 100644 --- a/CVE-2016/CVE-2016-52xx/CVE-2016-5263.json +++ b/CVE-2016/CVE-2016-52xx/CVE-2016-5263.json @@ -2,7 +2,7 @@ "id": "CVE-2016-5263", "sourceIdentifier": "security@mozilla.org", "published": "2016-08-05T01:59:19.173", - "lastModified": "2019-12-27T16:08:55.810", + "lastModified": "2024-10-21T13:11:23.977", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -89,25 +89,25 @@ "versionEndIncluding": "47.0.1", "matchCriteriaId": "1456CC69-6E37-4C75-8D9A-172ED8A571EB" }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:45.1.1:*:*:*:*:*:*:*", + "matchCriteriaId": "1E084D09-97BE-43E1-94D1-05206E513B99" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:45.2.0:*:*:*:*:*:*:*", + "matchCriteriaId": "915E92FE-8049-4EA5-95B8-F3EA25F78546" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:45.3.0:*:*:*:*:*:*:*", + "matchCriteriaId": "CA9E7A47-5E77-4736-920A-93283E30DC7C" + }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:45.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "B877383B-F7B3-433F-B7B0-2B1C731504F2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:45.1.1:*:*:*:*:*:*:*", - "matchCriteriaId": "4F18C6F4-5C04-4E4B-A2CC-29C5338F0CD1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:45.2.0:*:*:*:*:*:*:*", - "matchCriteriaId": "BD9B460C-3328-44DC-AA80-EDE2E46AF787" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:45.3.0:*:*:*:*:*:*:*", - "matchCriteriaId": "BD5D9DC4-4D18-4491-BE90-CAE21CA1AA96" } ] } diff --git a/CVE-2016/CVE-2016-52xx/CVE-2016-5264.json b/CVE-2016/CVE-2016-52xx/CVE-2016-5264.json index 18a94282992..8ed1fb53fe0 100644 --- a/CVE-2016/CVE-2016-52xx/CVE-2016-5264.json +++ b/CVE-2016/CVE-2016-52xx/CVE-2016-5264.json @@ -2,7 +2,7 @@ "id": "CVE-2016-5264", "sourceIdentifier": "security@mozilla.org", "published": "2016-08-05T01:59:20.207", - "lastModified": "2019-12-27T16:08:55.810", + "lastModified": "2024-10-21T13:11:23.977", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -89,25 +89,25 @@ "versionEndIncluding": "47.0.1", "matchCriteriaId": "1456CC69-6E37-4C75-8D9A-172ED8A571EB" }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:45.1.1:*:*:*:*:*:*:*", + "matchCriteriaId": "1E084D09-97BE-43E1-94D1-05206E513B99" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:45.2.0:*:*:*:*:*:*:*", + "matchCriteriaId": "915E92FE-8049-4EA5-95B8-F3EA25F78546" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:45.3.0:*:*:*:*:*:*:*", + "matchCriteriaId": "CA9E7A47-5E77-4736-920A-93283E30DC7C" + }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:45.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "B877383B-F7B3-433F-B7B0-2B1C731504F2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:45.1.1:*:*:*:*:*:*:*", - "matchCriteriaId": "4F18C6F4-5C04-4E4B-A2CC-29C5338F0CD1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:45.2.0:*:*:*:*:*:*:*", - "matchCriteriaId": "BD9B460C-3328-44DC-AA80-EDE2E46AF787" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:45.3.0:*:*:*:*:*:*:*", - "matchCriteriaId": "BD5D9DC4-4D18-4491-BE90-CAE21CA1AA96" } ] } diff --git a/CVE-2016/CVE-2016-52xx/CVE-2016-5265.json b/CVE-2016/CVE-2016-52xx/CVE-2016-5265.json index 9c86665c51f..2985fe9f945 100644 --- a/CVE-2016/CVE-2016-52xx/CVE-2016-5265.json +++ b/CVE-2016/CVE-2016-52xx/CVE-2016-5265.json @@ -2,7 +2,7 @@ "id": "CVE-2016-5265", "sourceIdentifier": "security@mozilla.org", "published": "2016-08-05T01:59:21.173", - "lastModified": "2019-12-27T16:08:55.810", + "lastModified": "2024-10-21T13:11:23.977", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -118,25 +118,25 @@ "versionEndIncluding": "47.0.1", "matchCriteriaId": "1456CC69-6E37-4C75-8D9A-172ED8A571EB" }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:45.1.1:*:*:*:*:*:*:*", + "matchCriteriaId": "1E084D09-97BE-43E1-94D1-05206E513B99" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:45.2.0:*:*:*:*:*:*:*", + "matchCriteriaId": "915E92FE-8049-4EA5-95B8-F3EA25F78546" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:45.3.0:*:*:*:*:*:*:*", + "matchCriteriaId": "CA9E7A47-5E77-4736-920A-93283E30DC7C" + }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:45.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "B877383B-F7B3-433F-B7B0-2B1C731504F2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:45.1.1:*:*:*:*:*:*:*", - "matchCriteriaId": "4F18C6F4-5C04-4E4B-A2CC-29C5338F0CD1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:45.2.0:*:*:*:*:*:*:*", - "matchCriteriaId": "BD9B460C-3328-44DC-AA80-EDE2E46AF787" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:45.3.0:*:*:*:*:*:*:*", - "matchCriteriaId": "BD5D9DC4-4D18-4491-BE90-CAE21CA1AA96" } ] } diff --git a/CVE-2016/CVE-2016-52xx/CVE-2016-5270.json b/CVE-2016/CVE-2016-52xx/CVE-2016-5270.json index 1561a2d2ffd..5c698c8e385 100644 --- a/CVE-2016/CVE-2016-52xx/CVE-2016-5270.json +++ b/CVE-2016/CVE-2016-52xx/CVE-2016-5270.json @@ -2,7 +2,7 @@ "id": "CVE-2016-5270", "sourceIdentifier": "security@mozilla.org", "published": "2016-09-22T22:59:03.677", - "lastModified": "2018-06-12T01:29:00.737", + "lastModified": "2024-10-21T13:11:23.977", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -93,25 +93,25 @@ "versionEndIncluding": "48.0.2", "matchCriteriaId": "C56407AD-F303-4E6E-A64E-4AFA23BFB739" }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:45.1.1:*:*:*:*:*:*:*", + "matchCriteriaId": "1E084D09-97BE-43E1-94D1-05206E513B99" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:45.2.0:*:*:*:*:*:*:*", + "matchCriteriaId": "915E92FE-8049-4EA5-95B8-F3EA25F78546" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:45.3.0:*:*:*:*:*:*:*", + "matchCriteriaId": "CA9E7A47-5E77-4736-920A-93283E30DC7C" + }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:45.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "B877383B-F7B3-433F-B7B0-2B1C731504F2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:45.1.1:*:*:*:*:*:*:*", - "matchCriteriaId": "4F18C6F4-5C04-4E4B-A2CC-29C5338F0CD1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:45.2.0:*:*:*:*:*:*:*", - "matchCriteriaId": "BD9B460C-3328-44DC-AA80-EDE2E46AF787" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:45.3.0:*:*:*:*:*:*:*", - "matchCriteriaId": "BD5D9DC4-4D18-4491-BE90-CAE21CA1AA96" } ] } diff --git a/CVE-2016/CVE-2016-52xx/CVE-2016-5272.json b/CVE-2016/CVE-2016-52xx/CVE-2016-5272.json index 3396a44b82e..c847e572eee 100644 --- a/CVE-2016/CVE-2016-52xx/CVE-2016-5272.json +++ b/CVE-2016/CVE-2016-52xx/CVE-2016-5272.json @@ -2,7 +2,7 @@ "id": "CVE-2016-5272", "sourceIdentifier": "security@mozilla.org", "published": "2016-09-22T22:59:05.833", - "lastModified": "2018-06-12T01:29:00.830", + "lastModified": "2024-10-21T13:11:23.977", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -89,25 +89,25 @@ "versionEndIncluding": "48.0.2", "matchCriteriaId": "C56407AD-F303-4E6E-A64E-4AFA23BFB739" }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:45.1.1:*:*:*:*:*:*:*", + "matchCriteriaId": "1E084D09-97BE-43E1-94D1-05206E513B99" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:45.2.0:*:*:*:*:*:*:*", + "matchCriteriaId": "915E92FE-8049-4EA5-95B8-F3EA25F78546" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:45.3.0:*:*:*:*:*:*:*", + "matchCriteriaId": "CA9E7A47-5E77-4736-920A-93283E30DC7C" + }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:45.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "B877383B-F7B3-433F-B7B0-2B1C731504F2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:45.1.1:*:*:*:*:*:*:*", - "matchCriteriaId": "4F18C6F4-5C04-4E4B-A2CC-29C5338F0CD1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:45.2.0:*:*:*:*:*:*:*", - "matchCriteriaId": "BD9B460C-3328-44DC-AA80-EDE2E46AF787" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:45.3.0:*:*:*:*:*:*:*", - "matchCriteriaId": "BD5D9DC4-4D18-4491-BE90-CAE21CA1AA96" } ] } diff --git a/CVE-2016/CVE-2016-52xx/CVE-2016-5274.json b/CVE-2016/CVE-2016-52xx/CVE-2016-5274.json index 431ed8c0507..66885dbe5d2 100644 --- a/CVE-2016/CVE-2016-52xx/CVE-2016-5274.json +++ b/CVE-2016/CVE-2016-52xx/CVE-2016-5274.json @@ -2,7 +2,7 @@ "id": "CVE-2016-5274", "sourceIdentifier": "security@mozilla.org", "published": "2016-09-22T22:59:07.817", - "lastModified": "2018-06-12T01:29:00.893", + "lastModified": "2024-10-21T13:11:23.977", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -89,25 +89,25 @@ "versionEndIncluding": "48.0.2", "matchCriteriaId": "C56407AD-F303-4E6E-A64E-4AFA23BFB739" }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:45.1.1:*:*:*:*:*:*:*", + "matchCriteriaId": "1E084D09-97BE-43E1-94D1-05206E513B99" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:45.2.0:*:*:*:*:*:*:*", + "matchCriteriaId": "915E92FE-8049-4EA5-95B8-F3EA25F78546" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:45.3.0:*:*:*:*:*:*:*", + "matchCriteriaId": "CA9E7A47-5E77-4736-920A-93283E30DC7C" + }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:45.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "B877383B-F7B3-433F-B7B0-2B1C731504F2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:45.1.1:*:*:*:*:*:*:*", - "matchCriteriaId": "4F18C6F4-5C04-4E4B-A2CC-29C5338F0CD1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:45.2.0:*:*:*:*:*:*:*", - "matchCriteriaId": "BD9B460C-3328-44DC-AA80-EDE2E46AF787" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:45.3.0:*:*:*:*:*:*:*", - "matchCriteriaId": "BD5D9DC4-4D18-4491-BE90-CAE21CA1AA96" } ] } diff --git a/CVE-2016/CVE-2016-52xx/CVE-2016-5276.json b/CVE-2016/CVE-2016-52xx/CVE-2016-5276.json index b4ca18a765e..f54d9aeaa84 100644 --- a/CVE-2016/CVE-2016-52xx/CVE-2016-5276.json +++ b/CVE-2016/CVE-2016-52xx/CVE-2016-5276.json @@ -2,7 +2,7 @@ "id": "CVE-2016-5276", "sourceIdentifier": "security@mozilla.org", "published": "2016-09-22T22:59:10.113", - "lastModified": "2018-06-12T01:29:00.987", + "lastModified": "2024-10-21T13:11:23.977", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -89,25 +89,25 @@ "versionEndIncluding": "48.0.2", "matchCriteriaId": "C56407AD-F303-4E6E-A64E-4AFA23BFB739" }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:45.1.1:*:*:*:*:*:*:*", + "matchCriteriaId": "1E084D09-97BE-43E1-94D1-05206E513B99" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:45.2.0:*:*:*:*:*:*:*", + "matchCriteriaId": "915E92FE-8049-4EA5-95B8-F3EA25F78546" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:45.3.0:*:*:*:*:*:*:*", + "matchCriteriaId": "CA9E7A47-5E77-4736-920A-93283E30DC7C" + }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:45.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "B877383B-F7B3-433F-B7B0-2B1C731504F2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:45.1.1:*:*:*:*:*:*:*", - "matchCriteriaId": "4F18C6F4-5C04-4E4B-A2CC-29C5338F0CD1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:45.2.0:*:*:*:*:*:*:*", - "matchCriteriaId": "BD9B460C-3328-44DC-AA80-EDE2E46AF787" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:45.3.0:*:*:*:*:*:*:*", - "matchCriteriaId": "BD5D9DC4-4D18-4491-BE90-CAE21CA1AA96" } ] } diff --git a/CVE-2016/CVE-2016-52xx/CVE-2016-5277.json b/CVE-2016/CVE-2016-52xx/CVE-2016-5277.json index 78c8b4d551b..16773d0921c 100644 --- a/CVE-2016/CVE-2016-52xx/CVE-2016-5277.json +++ b/CVE-2016/CVE-2016-52xx/CVE-2016-5277.json @@ -2,7 +2,7 @@ "id": "CVE-2016-5277", "sourceIdentifier": "security@mozilla.org", "published": "2016-09-22T22:59:11.567", - "lastModified": "2018-06-12T01:29:01.067", + "lastModified": "2024-10-21T13:11:23.977", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -89,25 +89,25 @@ "versionEndIncluding": "48.0.2", "matchCriteriaId": "C56407AD-F303-4E6E-A64E-4AFA23BFB739" }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:45.1.1:*:*:*:*:*:*:*", + "matchCriteriaId": "1E084D09-97BE-43E1-94D1-05206E513B99" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:45.2.0:*:*:*:*:*:*:*", + "matchCriteriaId": "915E92FE-8049-4EA5-95B8-F3EA25F78546" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:45.3.0:*:*:*:*:*:*:*", + "matchCriteriaId": "CA9E7A47-5E77-4736-920A-93283E30DC7C" + }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:45.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "B877383B-F7B3-433F-B7B0-2B1C731504F2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:45.1.1:*:*:*:*:*:*:*", - "matchCriteriaId": "4F18C6F4-5C04-4E4B-A2CC-29C5338F0CD1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:45.2.0:*:*:*:*:*:*:*", - "matchCriteriaId": "BD9B460C-3328-44DC-AA80-EDE2E46AF787" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:45.3.0:*:*:*:*:*:*:*", - "matchCriteriaId": "BD5D9DC4-4D18-4491-BE90-CAE21CA1AA96" } ] } diff --git a/CVE-2016/CVE-2016-52xx/CVE-2016-5278.json b/CVE-2016/CVE-2016-52xx/CVE-2016-5278.json index 78551cf76e4..41714301b69 100644 --- a/CVE-2016/CVE-2016-52xx/CVE-2016-5278.json +++ b/CVE-2016/CVE-2016-52xx/CVE-2016-5278.json @@ -2,7 +2,7 @@ "id": "CVE-2016-5278", "sourceIdentifier": "security@mozilla.org", "published": "2016-09-22T22:59:12.757", - "lastModified": "2018-06-12T01:29:01.160", + "lastModified": "2024-10-21T13:11:23.977", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -89,25 +89,25 @@ "versionEndIncluding": "48.0.2", "matchCriteriaId": "C56407AD-F303-4E6E-A64E-4AFA23BFB739" }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:45.1.1:*:*:*:*:*:*:*", + "matchCriteriaId": "1E084D09-97BE-43E1-94D1-05206E513B99" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:45.2.0:*:*:*:*:*:*:*", + "matchCriteriaId": "915E92FE-8049-4EA5-95B8-F3EA25F78546" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:45.3.0:*:*:*:*:*:*:*", + "matchCriteriaId": "CA9E7A47-5E77-4736-920A-93283E30DC7C" + }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:45.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "B877383B-F7B3-433F-B7B0-2B1C731504F2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:45.1.1:*:*:*:*:*:*:*", - "matchCriteriaId": "4F18C6F4-5C04-4E4B-A2CC-29C5338F0CD1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:45.2.0:*:*:*:*:*:*:*", - "matchCriteriaId": "BD9B460C-3328-44DC-AA80-EDE2E46AF787" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:45.3.0:*:*:*:*:*:*:*", - "matchCriteriaId": "BD5D9DC4-4D18-4491-BE90-CAE21CA1AA96" } ] } diff --git a/CVE-2016/CVE-2016-52xx/CVE-2016-5280.json b/CVE-2016/CVE-2016-52xx/CVE-2016-5280.json index 2bad15d61df..36c7f3d2c30 100644 --- a/CVE-2016/CVE-2016-52xx/CVE-2016-5280.json +++ b/CVE-2016/CVE-2016-52xx/CVE-2016-5280.json @@ -2,7 +2,7 @@ "id": "CVE-2016-5280", "sourceIdentifier": "security@mozilla.org", "published": "2016-09-22T22:59:14.850", - "lastModified": "2018-10-30T16:27:02.717", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -89,6 +89,16 @@ "versionEndIncluding": "48.0.2", "matchCriteriaId": "C56407AD-F303-4E6E-A64E-4AFA23BFB739" }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:45.0:*:*:*:*:*:*:*", + "matchCriteriaId": "5000794D-2129-49A0-A88D-84C7558B2AD7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:45.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "AB24CED1-AAEB-41E8-9C02-71E19EDC0086" + }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox:45.0.2:*:*:*:*:*:*:*", @@ -96,28 +106,18 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:45.0:*:*:*:*:*:*:*", - "matchCriteriaId": "7D7A8F5C-80B8-409B-83FB-55690F2E7BD2" + "criteria": "cpe:2.3:a:mozilla:firefox:45.1.1:*:*:*:*:*:*:*", + "matchCriteriaId": "1E084D09-97BE-43E1-94D1-05206E513B99" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:45.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "1CFEE01D-26AB-4D13-89E9-522CEC40BCAA" + "criteria": "cpe:2.3:a:mozilla:firefox:45.2.0:*:*:*:*:*:*:*", + "matchCriteriaId": "915E92FE-8049-4EA5-95B8-F3EA25F78546" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:45.1.1:*:*:*:*:*:*:*", - "matchCriteriaId": "4F18C6F4-5C04-4E4B-A2CC-29C5338F0CD1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:45.2.0:*:*:*:*:*:*:*", - "matchCriteriaId": "BD9B460C-3328-44DC-AA80-EDE2E46AF787" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:45.3.0:*:*:*:*:*:*:*", - "matchCriteriaId": "BD5D9DC4-4D18-4491-BE90-CAE21CA1AA96" + "criteria": "cpe:2.3:a:mozilla:firefox:45.3.0:*:*:*:*:*:*:*", + "matchCriteriaId": "CA9E7A47-5E77-4736-920A-93283E30DC7C" } ] } diff --git a/CVE-2016/CVE-2016-52xx/CVE-2016-5281.json b/CVE-2016/CVE-2016-52xx/CVE-2016-5281.json index 645b6f8c498..581a1513b42 100644 --- a/CVE-2016/CVE-2016-52xx/CVE-2016-5281.json +++ b/CVE-2016/CVE-2016-52xx/CVE-2016-5281.json @@ -2,7 +2,7 @@ "id": "CVE-2016-5281", "sourceIdentifier": "security@mozilla.org", "published": "2016-09-22T22:59:15.910", - "lastModified": "2018-10-30T16:27:02.717", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -89,6 +89,16 @@ "versionEndIncluding": "48.0.2", "matchCriteriaId": "C56407AD-F303-4E6E-A64E-4AFA23BFB739" }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:45.0:*:*:*:*:*:*:*", + "matchCriteriaId": "5000794D-2129-49A0-A88D-84C7558B2AD7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:45.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "AB24CED1-AAEB-41E8-9C02-71E19EDC0086" + }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox:45.0.2:*:*:*:*:*:*:*", @@ -96,28 +106,18 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:45.0:*:*:*:*:*:*:*", - "matchCriteriaId": "7D7A8F5C-80B8-409B-83FB-55690F2E7BD2" + "criteria": "cpe:2.3:a:mozilla:firefox:45.1.1:*:*:*:*:*:*:*", + "matchCriteriaId": "1E084D09-97BE-43E1-94D1-05206E513B99" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:45.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "1CFEE01D-26AB-4D13-89E9-522CEC40BCAA" + "criteria": "cpe:2.3:a:mozilla:firefox:45.2.0:*:*:*:*:*:*:*", + "matchCriteriaId": "915E92FE-8049-4EA5-95B8-F3EA25F78546" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:45.1.1:*:*:*:*:*:*:*", - "matchCriteriaId": "4F18C6F4-5C04-4E4B-A2CC-29C5338F0CD1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:45.2.0:*:*:*:*:*:*:*", - "matchCriteriaId": "BD9B460C-3328-44DC-AA80-EDE2E46AF787" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:45.3.0:*:*:*:*:*:*:*", - "matchCriteriaId": "BD5D9DC4-4D18-4491-BE90-CAE21CA1AA96" + "criteria": "cpe:2.3:a:mozilla:firefox:45.3.0:*:*:*:*:*:*:*", + "matchCriteriaId": "CA9E7A47-5E77-4736-920A-93283E30DC7C" } ] } diff --git a/CVE-2016/CVE-2016-52xx/CVE-2016-5284.json b/CVE-2016/CVE-2016-52xx/CVE-2016-5284.json index 4a49066d8f8..764276afa8c 100644 --- a/CVE-2016/CVE-2016-52xx/CVE-2016-5284.json +++ b/CVE-2016/CVE-2016-52xx/CVE-2016-5284.json @@ -2,7 +2,7 @@ "id": "CVE-2016-5284", "sourceIdentifier": "security@mozilla.org", "published": "2016-09-22T22:59:18.973", - "lastModified": "2018-10-30T16:27:02.717", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -89,6 +89,16 @@ "versionEndIncluding": "48.0.2", "matchCriteriaId": "C56407AD-F303-4E6E-A64E-4AFA23BFB739" }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:45.0:*:*:*:*:*:*:*", + "matchCriteriaId": "5000794D-2129-49A0-A88D-84C7558B2AD7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:45.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "AB24CED1-AAEB-41E8-9C02-71E19EDC0086" + }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox:45.0.2:*:*:*:*:*:*:*", @@ -96,28 +106,18 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:45.0:*:*:*:*:*:*:*", - "matchCriteriaId": "7D7A8F5C-80B8-409B-83FB-55690F2E7BD2" + "criteria": "cpe:2.3:a:mozilla:firefox:45.1.1:*:*:*:*:*:*:*", + "matchCriteriaId": "1E084D09-97BE-43E1-94D1-05206E513B99" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:45.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "1CFEE01D-26AB-4D13-89E9-522CEC40BCAA" + "criteria": "cpe:2.3:a:mozilla:firefox:45.2.0:*:*:*:*:*:*:*", + "matchCriteriaId": "915E92FE-8049-4EA5-95B8-F3EA25F78546" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:45.1.1:*:*:*:*:*:*:*", - "matchCriteriaId": "4F18C6F4-5C04-4E4B-A2CC-29C5338F0CD1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:45.2.0:*:*:*:*:*:*:*", - "matchCriteriaId": "BD9B460C-3328-44DC-AA80-EDE2E46AF787" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:45.3.0:*:*:*:*:*:*:*", - "matchCriteriaId": "BD5D9DC4-4D18-4491-BE90-CAE21CA1AA96" + "criteria": "cpe:2.3:a:mozilla:firefox:45.3.0:*:*:*:*:*:*:*", + "matchCriteriaId": "CA9E7A47-5E77-4736-920A-93283E30DC7C" } ] } diff --git a/CVE-2016/CVE-2016-98xx/CVE-2016-9899.json b/CVE-2016/CVE-2016-98xx/CVE-2016-9899.json index 521bab6ab10..f19300fe22d 100644 --- a/CVE-2016/CVE-2016-98xx/CVE-2016-9899.json +++ b/CVE-2016/CVE-2016-98xx/CVE-2016-9899.json @@ -2,7 +2,7 @@ "id": "CVE-2016-9899", "sourceIdentifier": "security@mozilla.org", "published": "2018-06-11T21:29:02.203", - "lastModified": "2018-08-03T17:55:54.840", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -195,10 +195,10 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "versionStartIncluding": "52.0", "versionEndExcluding": "52.1.0", - "matchCriteriaId": "3FCAFD82-6B7F-4286-9317-1B287E43069E" + "matchCriteriaId": "EE6829EF-1620-42AA-A43B-5336E8357B68" } ] } diff --git a/CVE-2017/CVE-2017-54xx/CVE-2017-5429.json b/CVE-2017/CVE-2017-54xx/CVE-2017-5429.json index 3db34778d17..8d1ad8cbe0d 100644 --- a/CVE-2017/CVE-2017-54xx/CVE-2017-5429.json +++ b/CVE-2017/CVE-2017-54xx/CVE-2017-5429.json @@ -2,7 +2,7 @@ "id": "CVE-2017-5429", "sourceIdentifier": "security@mozilla.org", "published": "2018-06-11T21:29:05.483", - "lastModified": "2018-08-07T17:53:32.560", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -146,14 +146,14 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", - "versionEndExcluding": "45.9.0", - "matchCriteriaId": "58F03A98-1317-4A15-BAB3-AC045AA9AAE9" + "criteria": "cpe:2.3:a:mozilla:firefox:52.0:*:*:*:*:*:*:*", + "matchCriteriaId": "1C00F05B-5B10-401D-8C5E-517FAF7BCFE4" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:52.0:*:*:*:*:*:*:*", - "matchCriteriaId": "6AC0200B-0E23-446D-97FF-33341B55B886" + "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", + "versionEndExcluding": "45.9.0", + "matchCriteriaId": "58F03A98-1317-4A15-BAB3-AC045AA9AAE9" }, { "vulnerable": true, diff --git a/CVE-2017/CVE-2017-54xx/CVE-2017-5432.json b/CVE-2017/CVE-2017-54xx/CVE-2017-5432.json index 03dc2fea9c2..3ac41c9ddc9 100644 --- a/CVE-2017/CVE-2017-54xx/CVE-2017-5432.json +++ b/CVE-2017/CVE-2017-54xx/CVE-2017-5432.json @@ -2,7 +2,7 @@ "id": "CVE-2017-5432", "sourceIdentifier": "security@mozilla.org", "published": "2018-06-11T21:29:05.593", - "lastModified": "2018-08-07T17:56:26.117", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -191,8 +191,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:52.0:*:*:*:*:*:*:*", - "matchCriteriaId": "6AC0200B-0E23-446D-97FF-33341B55B886" + "criteria": "cpe:2.3:a:mozilla:firefox:52.0:*:*:*:*:*:*:*", + "matchCriteriaId": "1C00F05B-5B10-401D-8C5E-517FAF7BCFE4" } ] } diff --git a/CVE-2017/CVE-2017-54xx/CVE-2017-5433.json b/CVE-2017/CVE-2017-54xx/CVE-2017-5433.json index 2ed7c40a11a..493b24d874b 100644 --- a/CVE-2017/CVE-2017-54xx/CVE-2017-5433.json +++ b/CVE-2017/CVE-2017-54xx/CVE-2017-5433.json @@ -2,7 +2,7 @@ "id": "CVE-2017-5433", "sourceIdentifier": "security@mozilla.org", "published": "2018-06-11T21:29:05.657", - "lastModified": "2018-08-07T17:58:20.610", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -181,14 +181,14 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", - "versionEndExcluding": "45.9.0", - "matchCriteriaId": "58F03A98-1317-4A15-BAB3-AC045AA9AAE9" + "criteria": "cpe:2.3:a:mozilla:firefox:52.0:*:*:*:*:*:*:*", + "matchCriteriaId": "1C00F05B-5B10-401D-8C5E-517FAF7BCFE4" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:52.0:*:*:*:*:*:*:*", - "matchCriteriaId": "6AC0200B-0E23-446D-97FF-33341B55B886" + "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", + "versionEndExcluding": "45.9.0", + "matchCriteriaId": "58F03A98-1317-4A15-BAB3-AC045AA9AAE9" }, { "vulnerable": true, diff --git a/CVE-2017/CVE-2017-54xx/CVE-2017-5434.json b/CVE-2017/CVE-2017-54xx/CVE-2017-5434.json index 0d24bc7cb96..8206b8cf7aa 100644 --- a/CVE-2017/CVE-2017-54xx/CVE-2017-5434.json +++ b/CVE-2017/CVE-2017-54xx/CVE-2017-5434.json @@ -2,7 +2,7 @@ "id": "CVE-2017-5434", "sourceIdentifier": "security@mozilla.org", "published": "2018-06-11T21:29:05.703", - "lastModified": "2018-08-07T18:00:07.397", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -146,14 +146,14 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", - "versionEndExcluding": "45.9.0", - "matchCriteriaId": "58F03A98-1317-4A15-BAB3-AC045AA9AAE9" + "criteria": "cpe:2.3:a:mozilla:firefox:52.0:*:*:*:*:*:*:*", + "matchCriteriaId": "1C00F05B-5B10-401D-8C5E-517FAF7BCFE4" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:52.0:*:*:*:*:*:*:*", - "matchCriteriaId": "6AC0200B-0E23-446D-97FF-33341B55B886" + "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", + "versionEndExcluding": "45.9.0", + "matchCriteriaId": "58F03A98-1317-4A15-BAB3-AC045AA9AAE9" }, { "vulnerable": true, diff --git a/CVE-2017/CVE-2017-54xx/CVE-2017-5435.json b/CVE-2017/CVE-2017-54xx/CVE-2017-5435.json index 48e6df54b3e..def42bf9eef 100644 --- a/CVE-2017/CVE-2017-54xx/CVE-2017-5435.json +++ b/CVE-2017/CVE-2017-54xx/CVE-2017-5435.json @@ -2,7 +2,7 @@ "id": "CVE-2017-5435", "sourceIdentifier": "security@mozilla.org", "published": "2018-06-11T21:29:05.750", - "lastModified": "2018-08-07T18:01:00.983", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -191,8 +191,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:52.0:*:*:*:*:*:*:*", - "matchCriteriaId": "6AC0200B-0E23-446D-97FF-33341B55B886" + "criteria": "cpe:2.3:a:mozilla:firefox:52.0:*:*:*:*:*:*:*", + "matchCriteriaId": "1C00F05B-5B10-401D-8C5E-517FAF7BCFE4" } ] } diff --git a/CVE-2017/CVE-2017-54xx/CVE-2017-5436.json b/CVE-2017/CVE-2017-54xx/CVE-2017-5436.json index fca76c4285c..4141441227a 100644 --- a/CVE-2017/CVE-2017-54xx/CVE-2017-5436.json +++ b/CVE-2017/CVE-2017-54xx/CVE-2017-5436.json @@ -2,7 +2,7 @@ "id": "CVE-2017-5436", "sourceIdentifier": "security@mozilla.org", "published": "2018-06-11T21:29:05.827", - "lastModified": "2018-08-07T18:01:45.533", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -196,14 +196,14 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", - "versionEndExcluding": "45.9.0", - "matchCriteriaId": "58F03A98-1317-4A15-BAB3-AC045AA9AAE9" + "criteria": "cpe:2.3:a:mozilla:firefox:52.0:*:*:*:*:*:*:*", + "matchCriteriaId": "1C00F05B-5B10-401D-8C5E-517FAF7BCFE4" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:52.0:*:*:*:*:*:*:*", - "matchCriteriaId": "6AC0200B-0E23-446D-97FF-33341B55B886" + "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", + "versionEndExcluding": "45.9.0", + "matchCriteriaId": "58F03A98-1317-4A15-BAB3-AC045AA9AAE9" }, { "vulnerable": true, diff --git a/CVE-2017/CVE-2017-54xx/CVE-2017-5438.json b/CVE-2017/CVE-2017-54xx/CVE-2017-5438.json index 9d996884843..9f3b4343448 100644 --- a/CVE-2017/CVE-2017-54xx/CVE-2017-5438.json +++ b/CVE-2017/CVE-2017-54xx/CVE-2017-5438.json @@ -2,7 +2,7 @@ "id": "CVE-2017-5438", "sourceIdentifier": "security@mozilla.org", "published": "2018-06-11T21:29:05.890", - "lastModified": "2018-08-07T18:02:27.037", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -181,14 +181,14 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", - "versionEndExcluding": "45.9.0", - "matchCriteriaId": "58F03A98-1317-4A15-BAB3-AC045AA9AAE9" + "criteria": "cpe:2.3:a:mozilla:firefox:52.0:*:*:*:*:*:*:*", + "matchCriteriaId": "1C00F05B-5B10-401D-8C5E-517FAF7BCFE4" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:52.0:*:*:*:*:*:*:*", - "matchCriteriaId": "6AC0200B-0E23-446D-97FF-33341B55B886" + "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", + "versionEndExcluding": "45.9.0", + "matchCriteriaId": "58F03A98-1317-4A15-BAB3-AC045AA9AAE9" }, { "vulnerable": true, diff --git a/CVE-2017/CVE-2017-54xx/CVE-2017-5439.json b/CVE-2017/CVE-2017-54xx/CVE-2017-5439.json index 69860f6f962..e4b8e404573 100644 --- a/CVE-2017/CVE-2017-54xx/CVE-2017-5439.json +++ b/CVE-2017/CVE-2017-54xx/CVE-2017-5439.json @@ -2,7 +2,7 @@ "id": "CVE-2017-5439", "sourceIdentifier": "security@mozilla.org", "published": "2018-06-11T21:29:05.937", - "lastModified": "2018-08-07T18:03:36.307", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -175,10 +175,10 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "versionStartIncluding": "52.0", "versionEndExcluding": "52.1.0", - "matchCriteriaId": "3FCAFD82-6B7F-4286-9317-1B287E43069E" + "matchCriteriaId": "EE6829EF-1620-42AA-A43B-5336E8357B68" } ] } diff --git a/CVE-2017/CVE-2017-54xx/CVE-2017-5440.json b/CVE-2017/CVE-2017-54xx/CVE-2017-5440.json index af91046b0bc..dd4378af4c1 100644 --- a/CVE-2017/CVE-2017-54xx/CVE-2017-5440.json +++ b/CVE-2017/CVE-2017-54xx/CVE-2017-5440.json @@ -2,7 +2,7 @@ "id": "CVE-2017-5440", "sourceIdentifier": "security@mozilla.org", "published": "2018-06-11T21:29:05.983", - "lastModified": "2018-08-07T18:04:54.093", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -181,14 +181,14 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", - "versionEndExcluding": "45.9.0", - "matchCriteriaId": "58F03A98-1317-4A15-BAB3-AC045AA9AAE9" + "criteria": "cpe:2.3:a:mozilla:firefox:52.0:*:*:*:*:*:*:*", + "matchCriteriaId": "1C00F05B-5B10-401D-8C5E-517FAF7BCFE4" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:52.0:*:*:*:*:*:*:*", - "matchCriteriaId": "6AC0200B-0E23-446D-97FF-33341B55B886" + "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", + "versionEndExcluding": "45.9.0", + "matchCriteriaId": "58F03A98-1317-4A15-BAB3-AC045AA9AAE9" }, { "vulnerable": true, diff --git a/CVE-2017/CVE-2017-54xx/CVE-2017-5441.json b/CVE-2017/CVE-2017-54xx/CVE-2017-5441.json index 0f9ce75092d..dfb20398ffc 100644 --- a/CVE-2017/CVE-2017-54xx/CVE-2017-5441.json +++ b/CVE-2017/CVE-2017-54xx/CVE-2017-5441.json @@ -2,7 +2,7 @@ "id": "CVE-2017-5441", "sourceIdentifier": "security@mozilla.org", "published": "2018-06-11T21:29:06.030", - "lastModified": "2018-08-07T18:05:30.093", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -181,14 +181,14 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", - "versionEndExcluding": "45.9.0", - "matchCriteriaId": "58F03A98-1317-4A15-BAB3-AC045AA9AAE9" + "criteria": "cpe:2.3:a:mozilla:firefox:52.0:*:*:*:*:*:*:*", + "matchCriteriaId": "1C00F05B-5B10-401D-8C5E-517FAF7BCFE4" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:52.0:*:*:*:*:*:*:*", - "matchCriteriaId": "6AC0200B-0E23-446D-97FF-33341B55B886" + "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", + "versionEndExcluding": "45.9.0", + "matchCriteriaId": "58F03A98-1317-4A15-BAB3-AC045AA9AAE9" }, { "vulnerable": true, diff --git a/CVE-2017/CVE-2017-54xx/CVE-2017-5442.json b/CVE-2017/CVE-2017-54xx/CVE-2017-5442.json index 226cb2f09c7..7f9e30c08c9 100644 --- a/CVE-2017/CVE-2017-54xx/CVE-2017-5442.json +++ b/CVE-2017/CVE-2017-54xx/CVE-2017-5442.json @@ -2,7 +2,7 @@ "id": "CVE-2017-5442", "sourceIdentifier": "security@mozilla.org", "published": "2018-06-11T21:29:06.107", - "lastModified": "2018-08-07T18:16:12.297", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -181,14 +181,14 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", - "versionEndExcluding": "45.9.0", - "matchCriteriaId": "58F03A98-1317-4A15-BAB3-AC045AA9AAE9" + "criteria": "cpe:2.3:a:mozilla:firefox:52.0:*:*:*:*:*:*:*", + "matchCriteriaId": "1C00F05B-5B10-401D-8C5E-517FAF7BCFE4" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:52.0:*:*:*:*:*:*:*", - "matchCriteriaId": "6AC0200B-0E23-446D-97FF-33341B55B886" + "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", + "versionEndExcluding": "45.9.0", + "matchCriteriaId": "58F03A98-1317-4A15-BAB3-AC045AA9AAE9" }, { "vulnerable": true, diff --git a/CVE-2017/CVE-2017-54xx/CVE-2017-5443.json b/CVE-2017/CVE-2017-54xx/CVE-2017-5443.json index b9c1234f3a0..5e901c0ea1c 100644 --- a/CVE-2017/CVE-2017-54xx/CVE-2017-5443.json +++ b/CVE-2017/CVE-2017-54xx/CVE-2017-5443.json @@ -2,7 +2,7 @@ "id": "CVE-2017-5443", "sourceIdentifier": "security@mozilla.org", "published": "2018-06-11T21:29:06.157", - "lastModified": "2018-08-07T18:17:08.973", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -181,14 +181,14 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", - "versionEndExcluding": "45.9.0", - "matchCriteriaId": "58F03A98-1317-4A15-BAB3-AC045AA9AAE9" + "criteria": "cpe:2.3:a:mozilla:firefox:52.0:*:*:*:*:*:*:*", + "matchCriteriaId": "1C00F05B-5B10-401D-8C5E-517FAF7BCFE4" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:52.0:*:*:*:*:*:*:*", - "matchCriteriaId": "6AC0200B-0E23-446D-97FF-33341B55B886" + "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", + "versionEndExcluding": "45.9.0", + "matchCriteriaId": "58F03A98-1317-4A15-BAB3-AC045AA9AAE9" }, { "vulnerable": true, diff --git a/CVE-2017/CVE-2017-54xx/CVE-2017-5444.json b/CVE-2017/CVE-2017-54xx/CVE-2017-5444.json index cb95539e999..09aa9f5e53b 100644 --- a/CVE-2017/CVE-2017-54xx/CVE-2017-5444.json +++ b/CVE-2017/CVE-2017-54xx/CVE-2017-5444.json @@ -2,7 +2,7 @@ "id": "CVE-2017-5444", "sourceIdentifier": "security@mozilla.org", "published": "2018-06-11T21:29:06.217", - "lastModified": "2018-08-07T18:17:54.697", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -181,14 +181,14 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", - "versionEndExcluding": "45.9.0", - "matchCriteriaId": "58F03A98-1317-4A15-BAB3-AC045AA9AAE9" + "criteria": "cpe:2.3:a:mozilla:firefox:52.0:*:*:*:*:*:*:*", + "matchCriteriaId": "1C00F05B-5B10-401D-8C5E-517FAF7BCFE4" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:52.0:*:*:*:*:*:*:*", - "matchCriteriaId": "6AC0200B-0E23-446D-97FF-33341B55B886" + "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", + "versionEndExcluding": "45.9.0", + "matchCriteriaId": "58F03A98-1317-4A15-BAB3-AC045AA9AAE9" }, { "vulnerable": true, diff --git a/CVE-2017/CVE-2017-54xx/CVE-2017-5445.json b/CVE-2017/CVE-2017-54xx/CVE-2017-5445.json index 2e8467f47aa..e144941c2e4 100644 --- a/CVE-2017/CVE-2017-54xx/CVE-2017-5445.json +++ b/CVE-2017/CVE-2017-54xx/CVE-2017-5445.json @@ -2,7 +2,7 @@ "id": "CVE-2017-5445", "sourceIdentifier": "security@mozilla.org", "published": "2018-06-11T21:29:06.280", - "lastModified": "2018-08-07T18:18:29.713", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -181,14 +181,14 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", - "versionEndExcluding": "45.9.0", - "matchCriteriaId": "58F03A98-1317-4A15-BAB3-AC045AA9AAE9" + "criteria": "cpe:2.3:a:mozilla:firefox:52.0:*:*:*:*:*:*:*", + "matchCriteriaId": "1C00F05B-5B10-401D-8C5E-517FAF7BCFE4" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:52.0:*:*:*:*:*:*:*", - "matchCriteriaId": "6AC0200B-0E23-446D-97FF-33341B55B886" + "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", + "versionEndExcluding": "45.9.0", + "matchCriteriaId": "58F03A98-1317-4A15-BAB3-AC045AA9AAE9" }, { "vulnerable": true, diff --git a/CVE-2017/CVE-2017-54xx/CVE-2017-5446.json b/CVE-2017/CVE-2017-54xx/CVE-2017-5446.json index 06e7fb8559d..7ef4157ffb6 100644 --- a/CVE-2017/CVE-2017-54xx/CVE-2017-5446.json +++ b/CVE-2017/CVE-2017-54xx/CVE-2017-5446.json @@ -2,7 +2,7 @@ "id": "CVE-2017-5446", "sourceIdentifier": "security@mozilla.org", "published": "2018-06-11T21:29:06.343", - "lastModified": "2018-08-07T18:19:07.747", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -181,14 +181,14 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", - "versionEndExcluding": "45.9.0", - "matchCriteriaId": "58F03A98-1317-4A15-BAB3-AC045AA9AAE9" + "criteria": "cpe:2.3:a:mozilla:firefox:52.0:*:*:*:*:*:*:*", + "matchCriteriaId": "1C00F05B-5B10-401D-8C5E-517FAF7BCFE4" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:52.0:*:*:*:*:*:*:*", - "matchCriteriaId": "6AC0200B-0E23-446D-97FF-33341B55B886" + "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", + "versionEndExcluding": "45.9.0", + "matchCriteriaId": "58F03A98-1317-4A15-BAB3-AC045AA9AAE9" }, { "vulnerable": true, diff --git a/CVE-2017/CVE-2017-54xx/CVE-2017-5447.json b/CVE-2017/CVE-2017-54xx/CVE-2017-5447.json index 71b2b486a81..4a48f75c38d 100644 --- a/CVE-2017/CVE-2017-54xx/CVE-2017-5447.json +++ b/CVE-2017/CVE-2017-54xx/CVE-2017-5447.json @@ -2,7 +2,7 @@ "id": "CVE-2017-5447", "sourceIdentifier": "security@mozilla.org", "published": "2018-06-11T21:29:06.390", - "lastModified": "2018-08-07T18:19:47.687", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -181,14 +181,14 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", - "versionEndExcluding": "45.9.0", - "matchCriteriaId": "58F03A98-1317-4A15-BAB3-AC045AA9AAE9" + "criteria": "cpe:2.3:a:mozilla:firefox:52.0:*:*:*:*:*:*:*", + "matchCriteriaId": "1C00F05B-5B10-401D-8C5E-517FAF7BCFE4" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:52.0:*:*:*:*:*:*:*", - "matchCriteriaId": "6AC0200B-0E23-446D-97FF-33341B55B886" + "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", + "versionEndExcluding": "45.9.0", + "matchCriteriaId": "58F03A98-1317-4A15-BAB3-AC045AA9AAE9" }, { "vulnerable": true, diff --git a/CVE-2017/CVE-2017-54xx/CVE-2017-5448.json b/CVE-2017/CVE-2017-54xx/CVE-2017-5448.json index dd070d03ca8..72edfa5cc84 100644 --- a/CVE-2017/CVE-2017-54xx/CVE-2017-5448.json +++ b/CVE-2017/CVE-2017-54xx/CVE-2017-5448.json @@ -2,7 +2,7 @@ "id": "CVE-2017-5448", "sourceIdentifier": "security@mozilla.org", "published": "2018-06-11T21:29:06.453", - "lastModified": "2018-08-09T15:30:33.573", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -191,10 +191,10 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "versionStartIncluding": "52.0", "versionEndExcluding": "52.1.0", - "matchCriteriaId": "3FCAFD82-6B7F-4286-9317-1B287E43069E" + "matchCriteriaId": "EE6829EF-1620-42AA-A43B-5336E8357B68" } ] } diff --git a/CVE-2017/CVE-2017-54xx/CVE-2017-5459.json b/CVE-2017/CVE-2017-54xx/CVE-2017-5459.json index 704ad7bd780..ac23bdef757 100644 --- a/CVE-2017/CVE-2017-54xx/CVE-2017-5459.json +++ b/CVE-2017/CVE-2017-54xx/CVE-2017-5459.json @@ -2,7 +2,7 @@ "id": "CVE-2017-5459", "sourceIdentifier": "security@mozilla.org", "published": "2018-06-11T21:29:06.967", - "lastModified": "2018-08-07T18:20:28.440", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -171,14 +171,14 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", - "versionEndExcluding": "45.9.0", - "matchCriteriaId": "58F03A98-1317-4A15-BAB3-AC045AA9AAE9" + "criteria": "cpe:2.3:a:mozilla:firefox:52.0:*:*:*:*:*:*:*", + "matchCriteriaId": "1C00F05B-5B10-401D-8C5E-517FAF7BCFE4" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:52.0:*:*:*:*:*:*:*", - "matchCriteriaId": "6AC0200B-0E23-446D-97FF-33341B55B886" + "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", + "versionEndExcluding": "45.9.0", + "matchCriteriaId": "58F03A98-1317-4A15-BAB3-AC045AA9AAE9" }, { "vulnerable": true, diff --git a/CVE-2017/CVE-2017-54xx/CVE-2017-5460.json b/CVE-2017/CVE-2017-54xx/CVE-2017-5460.json index 82ae4b01e76..a4e32110092 100644 --- a/CVE-2017/CVE-2017-54xx/CVE-2017-5460.json +++ b/CVE-2017/CVE-2017-54xx/CVE-2017-5460.json @@ -2,7 +2,7 @@ "id": "CVE-2017-5460", "sourceIdentifier": "security@mozilla.org", "published": "2018-06-11T21:29:07.030", - "lastModified": "2018-08-07T18:21:31.210", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -191,8 +191,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:52.0:*:*:*:*:*:*:*", - "matchCriteriaId": "6AC0200B-0E23-446D-97FF-33341B55B886" + "criteria": "cpe:2.3:a:mozilla:firefox:52.0:*:*:*:*:*:*:*", + "matchCriteriaId": "1C00F05B-5B10-401D-8C5E-517FAF7BCFE4" } ] } diff --git a/CVE-2017/CVE-2017-54xx/CVE-2017-5462.json b/CVE-2017/CVE-2017-54xx/CVE-2017-5462.json index 4d5812582e5..c9c19504ef4 100644 --- a/CVE-2017/CVE-2017-54xx/CVE-2017-5462.json +++ b/CVE-2017/CVE-2017-54xx/CVE-2017-5462.json @@ -2,7 +2,7 @@ "id": "CVE-2017-5462", "sourceIdentifier": "security@mozilla.org", "published": "2018-06-11T21:29:07.093", - "lastModified": "2019-10-03T00:03:26.223", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -106,14 +106,14 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", - "versionEndExcluding": "45.9.0", - "matchCriteriaId": "58F03A98-1317-4A15-BAB3-AC045AA9AAE9" + "criteria": "cpe:2.3:a:mozilla:firefox:52.0:*:*:*:*:*:*:*", + "matchCriteriaId": "1C00F05B-5B10-401D-8C5E-517FAF7BCFE4" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:52.0:*:*:*:*:*:*:*", - "matchCriteriaId": "6AC0200B-0E23-446D-97FF-33341B55B886" + "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", + "versionEndExcluding": "45.9.0", + "matchCriteriaId": "58F03A98-1317-4A15-BAB3-AC045AA9AAE9" }, { "vulnerable": true, diff --git a/CVE-2017/CVE-2017-54xx/CVE-2017-5464.json b/CVE-2017/CVE-2017-54xx/CVE-2017-5464.json index 998e2906b46..ce8cae5af63 100644 --- a/CVE-2017/CVE-2017-54xx/CVE-2017-5464.json +++ b/CVE-2017/CVE-2017-54xx/CVE-2017-5464.json @@ -2,7 +2,7 @@ "id": "CVE-2017-5464", "sourceIdentifier": "security@mozilla.org", "published": "2018-06-11T21:29:07.187", - "lastModified": "2018-08-07T18:43:59.927", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -191,8 +191,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:52.0:*:*:*:*:*:*:*", - "matchCriteriaId": "6AC0200B-0E23-446D-97FF-33341B55B886" + "criteria": "cpe:2.3:a:mozilla:firefox:52.0:*:*:*:*:*:*:*", + "matchCriteriaId": "1C00F05B-5B10-401D-8C5E-517FAF7BCFE4" } ] } diff --git a/CVE-2017/CVE-2017-54xx/CVE-2017-5465.json b/CVE-2017/CVE-2017-54xx/CVE-2017-5465.json index 3da99bdd078..68abfc615c4 100644 --- a/CVE-2017/CVE-2017-54xx/CVE-2017-5465.json +++ b/CVE-2017/CVE-2017-54xx/CVE-2017-5465.json @@ -2,7 +2,7 @@ "id": "CVE-2017-5465", "sourceIdentifier": "security@mozilla.org", "published": "2018-06-11T21:29:07.250", - "lastModified": "2018-08-07T18:44:19.567", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -181,14 +181,14 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", - "versionEndExcluding": "45.9.0", - "matchCriteriaId": "58F03A98-1317-4A15-BAB3-AC045AA9AAE9" + "criteria": "cpe:2.3:a:mozilla:firefox:52.0:*:*:*:*:*:*:*", + "matchCriteriaId": "1C00F05B-5B10-401D-8C5E-517FAF7BCFE4" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:52.0:*:*:*:*:*:*:*", - "matchCriteriaId": "6AC0200B-0E23-446D-97FF-33341B55B886" + "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", + "versionEndExcluding": "45.9.0", + "matchCriteriaId": "58F03A98-1317-4A15-BAB3-AC045AA9AAE9" }, { "vulnerable": true, diff --git a/CVE-2017/CVE-2017-54xx/CVE-2017-5469.json b/CVE-2017/CVE-2017-54xx/CVE-2017-5469.json index 5ead7f5de44..68c7fe43735 100644 --- a/CVE-2017/CVE-2017-54xx/CVE-2017-5469.json +++ b/CVE-2017/CVE-2017-54xx/CVE-2017-5469.json @@ -2,7 +2,7 @@ "id": "CVE-2017-5469", "sourceIdentifier": "security@mozilla.org", "published": "2018-06-11T21:29:07.453", - "lastModified": "2018-08-07T18:44:47.397", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -181,14 +181,14 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", - "versionEndExcluding": "45.9.0", - "matchCriteriaId": "58F03A98-1317-4A15-BAB3-AC045AA9AAE9" + "criteria": "cpe:2.3:a:mozilla:firefox:52.0:*:*:*:*:*:*:*", + "matchCriteriaId": "1C00F05B-5B10-401D-8C5E-517FAF7BCFE4" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:52.0:*:*:*:*:*:*:*", - "matchCriteriaId": "6AC0200B-0E23-446D-97FF-33341B55B886" + "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", + "versionEndExcluding": "45.9.0", + "matchCriteriaId": "58F03A98-1317-4A15-BAB3-AC045AA9AAE9" }, { "vulnerable": true, diff --git a/CVE-2017/CVE-2017-77xx/CVE-2017-7786.json b/CVE-2017/CVE-2017-77xx/CVE-2017-7786.json index 1c77edef858..42622a4e4c1 100644 --- a/CVE-2017/CVE-2017-77xx/CVE-2017-7786.json +++ b/CVE-2017/CVE-2017-77xx/CVE-2017-7786.json @@ -2,7 +2,7 @@ "id": "CVE-2017-7786", "sourceIdentifier": "security@mozilla.org", "published": "2018-06-11T21:29:09.170", - "lastModified": "2018-08-03T15:09:48.170", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -200,10 +200,10 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "versionStartIncluding": "52.0", "versionEndExcluding": "52.1.0", - "matchCriteriaId": "3FCAFD82-6B7F-4286-9317-1B287E43069E" + "matchCriteriaId": "EE6829EF-1620-42AA-A43B-5336E8357B68" } ] } diff --git a/CVE-2017/CVE-2017-78xx/CVE-2017-7805.json b/CVE-2017/CVE-2017-78xx/CVE-2017-7805.json index 23852f3498c..d8dfd0bf4c1 100644 --- a/CVE-2017/CVE-2017-78xx/CVE-2017-7805.json +++ b/CVE-2017/CVE-2017-78xx/CVE-2017-7805.json @@ -2,7 +2,7 @@ "id": "CVE-2017-7805", "sourceIdentifier": "security@mozilla.org", "published": "2018-06-11T21:29:10.047", - "lastModified": "2018-10-17T01:30:58.527", + "lastModified": "2024-10-21T13:11:23.977", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -85,13 +85,13 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox:56.0:*:*:*:*:*:*:*", - "matchCriteriaId": "4EE4FDF7-3856-4D26-A4F3-DDD5D18DE940" + "criteria": "cpe:2.3:a:mozilla:firefox:52.4.0:*:*:*:*:*:*:*", + "matchCriteriaId": "147EE39E-C1BB-4793-8932-D474FE8C89DB" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:52.4.0:*:*:*:*:*:*:*", - "matchCriteriaId": "8EC4764D-4FC5-4A77-8CEC-384DEE7A0F48" + "criteria": "cpe:2.3:a:mozilla:firefox:56.0:*:*:*:*:*:*:*", + "matchCriteriaId": "4EE4FDF7-3856-4D26-A4F3-DDD5D18DE940" }, { "vulnerable": true, diff --git a/CVE-2018/CVE-2018-123xx/CVE-2018-12360.json b/CVE-2018/CVE-2018-123xx/CVE-2018-12360.json index a9d785fbcd9..fd771f2ba51 100644 --- a/CVE-2018/CVE-2018-123xx/CVE-2018-12360.json +++ b/CVE-2018/CVE-2018-123xx/CVE-2018-12360.json @@ -2,7 +2,7 @@ "id": "CVE-2018-12360", "sourceIdentifier": "security@mozilla.org", "published": "2018-10-18T13:29:00.853", - "lastModified": "2018-12-03T20:08:09.937", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -201,16 +201,16 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", - "versionEndExcluding": "52.9", - "matchCriteriaId": "A6C8C7E3-CDC4-4C30-A98D-CC55BF72A404" + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", + "versionStartIncluding": "53.0", + "versionEndExcluding": "60.1.0", + "matchCriteriaId": "C3B8C21C-B987-4585-BE32-7D9CB9FC1C24" }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", - "versionStartIncluding": "53.0", - "versionEndExcluding": "60.1.0", - "matchCriteriaId": "49E6F79E-7F4D-4C09-A3AD-48903D70480D" + "versionEndExcluding": "52.9", + "matchCriteriaId": "A6C8C7E3-CDC4-4C30-A98D-CC55BF72A404" }, { "vulnerable": true, diff --git a/CVE-2018/CVE-2018-123xx/CVE-2018-12362.json b/CVE-2018/CVE-2018-123xx/CVE-2018-12362.json index 8b79c60dbb0..3fe22c09f2f 100644 --- a/CVE-2018/CVE-2018-123xx/CVE-2018-12362.json +++ b/CVE-2018/CVE-2018-123xx/CVE-2018-12362.json @@ -2,7 +2,7 @@ "id": "CVE-2018-12362", "sourceIdentifier": "security@mozilla.org", "published": "2018-10-18T13:29:01.383", - "lastModified": "2018-12-03T20:11:26.143", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -201,16 +201,16 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", - "versionEndExcluding": "52.9", - "matchCriteriaId": "A6C8C7E3-CDC4-4C30-A98D-CC55BF72A404" + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", + "versionStartIncluding": "53.0", + "versionEndExcluding": "60.1.0", + "matchCriteriaId": "C3B8C21C-B987-4585-BE32-7D9CB9FC1C24" }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", - "versionStartIncluding": "53.0", - "versionEndExcluding": "60.1.0", - "matchCriteriaId": "49E6F79E-7F4D-4C09-A3AD-48903D70480D" + "versionEndExcluding": "52.9", + "matchCriteriaId": "A6C8C7E3-CDC4-4C30-A98D-CC55BF72A404" }, { "vulnerable": true, diff --git a/CVE-2018/CVE-2018-123xx/CVE-2018-12363.json b/CVE-2018/CVE-2018-123xx/CVE-2018-12363.json index 81c60937b05..c6686207c7a 100644 --- a/CVE-2018/CVE-2018-123xx/CVE-2018-12363.json +++ b/CVE-2018/CVE-2018-123xx/CVE-2018-12363.json @@ -2,7 +2,7 @@ "id": "CVE-2018-12363", "sourceIdentifier": "security@mozilla.org", "published": "2018-10-18T13:29:01.727", - "lastModified": "2018-12-03T20:10:26.643", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -201,16 +201,16 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", - "versionEndExcluding": "52.9", - "matchCriteriaId": "A6C8C7E3-CDC4-4C30-A98D-CC55BF72A404" + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", + "versionStartIncluding": "53.0", + "versionEndExcluding": "60.1.0", + "matchCriteriaId": "C3B8C21C-B987-4585-BE32-7D9CB9FC1C24" }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", - "versionStartIncluding": "53.0", - "versionEndExcluding": "60.1.0", - "matchCriteriaId": "49E6F79E-7F4D-4C09-A3AD-48903D70480D" + "versionEndExcluding": "52.9", + "matchCriteriaId": "A6C8C7E3-CDC4-4C30-A98D-CC55BF72A404" }, { "vulnerable": true, diff --git a/CVE-2018/CVE-2018-123xx/CVE-2018-12364.json b/CVE-2018/CVE-2018-123xx/CVE-2018-12364.json index 0244c77e2d6..b7d369bfcec 100644 --- a/CVE-2018/CVE-2018-123xx/CVE-2018-12364.json +++ b/CVE-2018/CVE-2018-123xx/CVE-2018-12364.json @@ -2,7 +2,7 @@ "id": "CVE-2018-12364", "sourceIdentifier": "security@mozilla.org", "published": "2018-10-18T13:29:02.040", - "lastModified": "2018-12-03T20:10:14.970", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -201,16 +201,16 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", - "versionEndExcluding": "52.9", - "matchCriteriaId": "A6C8C7E3-CDC4-4C30-A98D-CC55BF72A404" + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", + "versionStartIncluding": "53.0", + "versionEndExcluding": "60.1.0", + "matchCriteriaId": "C3B8C21C-B987-4585-BE32-7D9CB9FC1C24" }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", - "versionStartIncluding": "53.0", - "versionEndExcluding": "60.1.0", - "matchCriteriaId": "49E6F79E-7F4D-4C09-A3AD-48903D70480D" + "versionEndExcluding": "52.9", + "matchCriteriaId": "A6C8C7E3-CDC4-4C30-A98D-CC55BF72A404" }, { "vulnerable": true, diff --git a/CVE-2018/CVE-2018-123xx/CVE-2018-12365.json b/CVE-2018/CVE-2018-123xx/CVE-2018-12365.json index c1c70b1ef81..1589934fbbc 100644 --- a/CVE-2018/CVE-2018-123xx/CVE-2018-12365.json +++ b/CVE-2018/CVE-2018-123xx/CVE-2018-12365.json @@ -2,7 +2,7 @@ "id": "CVE-2018-12365", "sourceIdentifier": "security@mozilla.org", "published": "2018-10-18T13:29:02.400", - "lastModified": "2018-12-03T20:09:20.063", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -201,16 +201,16 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", - "versionEndExcluding": "52.9", - "matchCriteriaId": "A6C8C7E3-CDC4-4C30-A98D-CC55BF72A404" + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", + "versionStartIncluding": "53.0", + "versionEndExcluding": "60.1.0", + "matchCriteriaId": "C3B8C21C-B987-4585-BE32-7D9CB9FC1C24" }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", - "versionStartIncluding": "53.0", - "versionEndExcluding": "60.1.0", - "matchCriteriaId": "49E6F79E-7F4D-4C09-A3AD-48903D70480D" + "versionEndExcluding": "52.9", + "matchCriteriaId": "A6C8C7E3-CDC4-4C30-A98D-CC55BF72A404" }, { "vulnerable": true, diff --git a/CVE-2018/CVE-2018-123xx/CVE-2018-12366.json b/CVE-2018/CVE-2018-123xx/CVE-2018-12366.json index 6f386448fbb..1c9c99ca0ed 100644 --- a/CVE-2018/CVE-2018-123xx/CVE-2018-12366.json +++ b/CVE-2018/CVE-2018-123xx/CVE-2018-12366.json @@ -2,7 +2,7 @@ "id": "CVE-2018-12366", "sourceIdentifier": "security@mozilla.org", "published": "2018-10-18T13:29:02.727", - "lastModified": "2018-12-03T20:09:54.203", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -201,16 +201,16 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", - "versionEndExcluding": "52.9", - "matchCriteriaId": "A6C8C7E3-CDC4-4C30-A98D-CC55BF72A404" + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", + "versionStartIncluding": "53.0", + "versionEndExcluding": "60.1.0", + "matchCriteriaId": "C3B8C21C-B987-4585-BE32-7D9CB9FC1C24" }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", - "versionStartIncluding": "53.0", - "versionEndExcluding": "60.1.0", - "matchCriteriaId": "49E6F79E-7F4D-4C09-A3AD-48903D70480D" + "versionEndExcluding": "52.9", + "matchCriteriaId": "A6C8C7E3-CDC4-4C30-A98D-CC55BF72A404" }, { "vulnerable": true, diff --git a/CVE-2018/CVE-2018-123xx/CVE-2018-12368.json b/CVE-2018/CVE-2018-123xx/CVE-2018-12368.json index 16a0360d31e..f633b3dc282 100644 --- a/CVE-2018/CVE-2018-123xx/CVE-2018-12368.json +++ b/CVE-2018/CVE-2018-123xx/CVE-2018-12368.json @@ -2,7 +2,7 @@ "id": "CVE-2018-12368", "sourceIdentifier": "security@mozilla.org", "published": "2018-10-18T13:29:03.307", - "lastModified": "2019-10-03T00:03:26.223", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -92,16 +92,16 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", - "versionEndExcluding": "52.9", - "matchCriteriaId": "A6C8C7E3-CDC4-4C30-A98D-CC55BF72A404" + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", + "versionStartIncluding": "53.0", + "versionEndExcluding": "60.1.0", + "matchCriteriaId": "C3B8C21C-B987-4585-BE32-7D9CB9FC1C24" }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", - "versionStartIncluding": "53.0", - "versionEndExcluding": "60.1.0", - "matchCriteriaId": "49E6F79E-7F4D-4C09-A3AD-48903D70480D" + "versionEndExcluding": "52.9", + "matchCriteriaId": "A6C8C7E3-CDC4-4C30-A98D-CC55BF72A404" }, { "vulnerable": true, diff --git a/CVE-2018/CVE-2018-51xx/CVE-2018-5156.json b/CVE-2018/CVE-2018-51xx/CVE-2018-5156.json index b24c6e0f150..e2edd6a1e59 100644 --- a/CVE-2018/CVE-2018-51xx/CVE-2018-5156.json +++ b/CVE-2018/CVE-2018-51xx/CVE-2018-5156.json @@ -2,7 +2,7 @@ "id": "CVE-2018-5156", "sourceIdentifier": "security@mozilla.org", "published": "2018-10-18T13:29:06.557", - "lastModified": "2018-12-06T18:39:17.293", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -201,16 +201,16 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", - "versionEndExcluding": "52.9.0", - "matchCriteriaId": "E3A11F33-B35E-4782-B549-93ADAB11623A" + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", + "versionStartIncluding": "52.9.1", + "versionEndExcluding": "60.1.0", + "matchCriteriaId": "33A41AE9-F936-40FE-9A9E-61E628712ECE" }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", - "versionStartIncluding": "52.9.1", - "versionEndExcluding": "60.1.0", - "matchCriteriaId": "C96ADF1E-F03E-4422-87C4-4F53DBABBD01" + "versionEndExcluding": "52.9.0", + "matchCriteriaId": "E3A11F33-B35E-4782-B549-93ADAB11623A" }, { "vulnerable": true, diff --git a/CVE-2018/CVE-2018-51xx/CVE-2018-5188.json b/CVE-2018/CVE-2018-51xx/CVE-2018-5188.json index 6569ddb1e4b..40f705aceb6 100644 --- a/CVE-2018/CVE-2018-51xx/CVE-2018-5188.json +++ b/CVE-2018/CVE-2018-51xx/CVE-2018-5188.json @@ -2,7 +2,7 @@ "id": "CVE-2018-5188", "sourceIdentifier": "security@mozilla.org", "published": "2018-10-18T13:29:07.163", - "lastModified": "2018-12-06T18:44:37.707", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -141,16 +141,16 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", - "versionEndExcluding": "52.9", - "matchCriteriaId": "A6C8C7E3-CDC4-4C30-A98D-CC55BF72A404" + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", + "versionStartIncluding": "53.0", + "versionEndExcluding": "60.1.0", + "matchCriteriaId": "C3B8C21C-B987-4585-BE32-7D9CB9FC1C24" }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", - "versionStartIncluding": "53.0", - "versionEndExcluding": "60.1.0", - "matchCriteriaId": "49E6F79E-7F4D-4C09-A3AD-48903D70480D" + "versionEndExcluding": "52.9", + "matchCriteriaId": "A6C8C7E3-CDC4-4C30-A98D-CC55BF72A404" }, { "vulnerable": true, diff --git a/CVE-2019/CVE-2019-117xx/CVE-2019-11744.json b/CVE-2019/CVE-2019-117xx/CVE-2019-11744.json index d3b9bc3d893..0993afa6469 100644 --- a/CVE-2019/CVE-2019-117xx/CVE-2019-11744.json +++ b/CVE-2019/CVE-2019-117xx/CVE-2019-11744.json @@ -2,7 +2,7 @@ "id": "CVE-2019-11744", "sourceIdentifier": "security@mozilla.org", "published": "2019-09-27T18:15:12.130", - "lastModified": "2019-10-04T18:15:14.003", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -91,16 +91,16 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", - "versionEndExcluding": "60.9", - "matchCriteriaId": "FF946E25-3903-4910-AE6B-E3533F3999FB" + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", + "versionStartIncluding": "68.0", + "versionEndExcluding": "68.1", + "matchCriteriaId": "39E1DA03-46E1-439F-A5DA-9A3D30AD043F" }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", - "versionStartIncluding": "68.0", - "versionEndExcluding": "68.1", - "matchCriteriaId": "8F499C48-2DE1-45D0-88A8-9738419DB563" + "versionEndExcluding": "60.9", + "matchCriteriaId": "FF946E25-3903-4910-AE6B-E3533F3999FB" }, { "vulnerable": true, diff --git a/CVE-2019/CVE-2019-73xx/CVE-2019-7317.json b/CVE-2019/CVE-2019-73xx/CVE-2019-7317.json index b5e21f25238..f6e4f6c3d72 100644 --- a/CVE-2019/CVE-2019-73xx/CVE-2019-7317.json +++ b/CVE-2019/CVE-2019-73xx/CVE-2019-7317.json @@ -2,7 +2,7 @@ "id": "CVE-2019-7317", "sourceIdentifier": "cve@mitre.org", "published": "2019-02-04T08:29:00.447", - "lastModified": "2022-05-23T15:02:40.667", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -220,8 +220,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:-:*:*:*:*:*:*:*", - "matchCriteriaId": "5EF0CD8F-9F8A-474E-8A01-298736416711" + "criteria": "cpe:2.3:a:mozilla:firefox:-:*:*:*:*:*:*:*", + "matchCriteriaId": "97D4FFCF-5309-43B6-9FD5-680C6D535A7F" }, { "vulnerable": true, diff --git a/CVE-2019/CVE-2019-98xx/CVE-2019-9812.json b/CVE-2019/CVE-2019-98xx/CVE-2019-9812.json index 04b59480d64..2b185c97037 100644 --- a/CVE-2019/CVE-2019-98xx/CVE-2019-9812.json +++ b/CVE-2019/CVE-2019-98xx/CVE-2019-9812.json @@ -2,7 +2,7 @@ "id": "CVE-2019-9812", "sourceIdentifier": "security@mozilla.org", "published": "2020-01-08T22:15:13.310", - "lastModified": "2021-07-21T11:39:23.747", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -91,16 +91,16 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", - "versionEndExcluding": "60.9", - "matchCriteriaId": "FF946E25-3903-4910-AE6B-E3533F3999FB" + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", + "versionStartIncluding": "61.0", + "versionEndExcluding": "68.1", + "matchCriteriaId": "1C724DBE-DE75-4CFB-BC4C-B5F20DA25846" }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", - "versionStartIncluding": "61.0", - "versionEndExcluding": "68.1", - "matchCriteriaId": "216100D1-90E9-40FD-AD33-0DEEF767FDF3" + "versionEndExcluding": "60.9", + "matchCriteriaId": "FF946E25-3903-4910-AE6B-E3533F3999FB" } ] } diff --git a/CVE-2020/CVE-2020-156xx/CVE-2020-15652.json b/CVE-2020/CVE-2020-156xx/CVE-2020-15652.json index 04e49e7acef..0b1fe2b6deb 100644 --- a/CVE-2020/CVE-2020-156xx/CVE-2020-15652.json +++ b/CVE-2020/CVE-2020-156xx/CVE-2020-15652.json @@ -2,7 +2,7 @@ "id": "CVE-2020-15652", "sourceIdentifier": "security@mozilla.org", "published": "2020-08-10T18:15:12.297", - "lastModified": "2022-12-06T21:30:39.517", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -91,16 +91,16 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", - "versionEndExcluding": "68.11", - "matchCriteriaId": "A0267D9C-02C0-4057-AFBC-C14B11792AB2" + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", + "versionStartIncluding": "78.0", + "versionEndExcluding": "78.1", + "matchCriteriaId": "B7C6EE7F-C0DA-4347-8AC6-35309751B93C" }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", - "versionStartIncluding": "78.0", - "versionEndExcluding": "78.1", - "matchCriteriaId": "71C58BB2-3ED1-4CFA-9894-DABA9CC27835" + "versionEndExcluding": "68.11", + "matchCriteriaId": "A0267D9C-02C0-4057-AFBC-C14B11792AB2" }, { "vulnerable": true, diff --git a/CVE-2020/CVE-2020-156xx/CVE-2020-15663.json b/CVE-2020/CVE-2020-156xx/CVE-2020-15663.json index bdc5f16784c..3c6574fa2ea 100644 --- a/CVE-2020/CVE-2020-156xx/CVE-2020-15663.json +++ b/CVE-2020/CVE-2020-156xx/CVE-2020-15663.json @@ -2,7 +2,7 @@ "id": "CVE-2020-15663", "sourceIdentifier": "security@mozilla.org", "published": "2020-10-01T19:15:12.970", - "lastModified": "2022-07-12T17:42:04.277", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -91,17 +91,17 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", - "versionStartIncluding": "68.0", - "versionEndExcluding": "68.12", - "matchCriteriaId": "177D0A81-656D-40BD-926F-AD91D36CFC0D" + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", + "versionStartIncluding": "78.0", + "versionEndExcluding": "78.2", + "matchCriteriaId": "08650C9C-1E2B-4BFC-913A-08A8E92AFB0A" }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", - "versionStartIncluding": "78.0", - "versionEndExcluding": "78.2", - "matchCriteriaId": "BEA04C2D-0675-4FF0-A3F1-1CA971E067DE" + "versionStartIncluding": "68.0", + "versionEndExcluding": "68.12", + "matchCriteriaId": "177D0A81-656D-40BD-926F-AD91D36CFC0D" }, { "vulnerable": true, diff --git a/CVE-2020/CVE-2020-156xx/CVE-2020-15664.json b/CVE-2020/CVE-2020-156xx/CVE-2020-15664.json index f80ccf98c7c..c63ae2ef1e1 100644 --- a/CVE-2020/CVE-2020-156xx/CVE-2020-15664.json +++ b/CVE-2020/CVE-2020-156xx/CVE-2020-15664.json @@ -2,7 +2,7 @@ "id": "CVE-2020-15664", "sourceIdentifier": "security@mozilla.org", "published": "2020-10-01T19:15:13.047", - "lastModified": "2020-10-13T14:08:16.160", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -97,16 +97,16 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", - "versionEndExcluding": "68.12", - "matchCriteriaId": "F9B827CE-70B0-41B2-9C42-AD7F33F66A56" + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", + "versionStartIncluding": "78.0", + "versionEndExcluding": "78.2", + "matchCriteriaId": "08650C9C-1E2B-4BFC-913A-08A8E92AFB0A" }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", - "versionStartIncluding": "78.0", - "versionEndExcluding": "78.2", - "matchCriteriaId": "BEA04C2D-0675-4FF0-A3F1-1CA971E067DE" + "versionEndExcluding": "68.12", + "matchCriteriaId": "F9B827CE-70B0-41B2-9C42-AD7F33F66A56" }, { "vulnerable": true, diff --git a/CVE-2021/CVE-2021-384xx/CVE-2021-38492.json b/CVE-2021/CVE-2021-384xx/CVE-2021-38492.json index d18dd899d0f..6c3d652aad7 100644 --- a/CVE-2021/CVE-2021-384xx/CVE-2021-38492.json +++ b/CVE-2021/CVE-2021-384xx/CVE-2021-38492.json @@ -2,7 +2,7 @@ "id": "CVE-2021-38492", "sourceIdentifier": "security@mozilla.org", "published": "2021-11-03T01:15:07.200", - "lastModified": "2022-12-09T19:19:12.667", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -103,16 +103,16 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", - "versionEndExcluding": "78.14", - "matchCriteriaId": "CF306B4F-A578-4935-82BC-190F160F00CD" + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", + "versionStartIncluding": "91.0", + "versionEndExcluding": "91.1", + "matchCriteriaId": "5CE2287C-BD2C-4124-84B5-2AE73F0B4A99" }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", - "versionStartIncluding": "91.0", - "versionEndExcluding": "91.1", - "matchCriteriaId": "7E7D501C-F35F-4EAF-AC72-CC6B79405B6A" + "versionEndExcluding": "78.14", + "matchCriteriaId": "CF306B4F-A578-4935-82BC-190F160F00CD" }, { "vulnerable": true, diff --git a/CVE-2021/CVE-2021-384xx/CVE-2021-38496.json b/CVE-2021/CVE-2021-384xx/CVE-2021-38496.json index d1576adeac0..d2f77d764de 100644 --- a/CVE-2021/CVE-2021-384xx/CVE-2021-38496.json +++ b/CVE-2021/CVE-2021-384xx/CVE-2021-38496.json @@ -2,7 +2,7 @@ "id": "CVE-2021-38496", "sourceIdentifier": "security@mozilla.org", "published": "2021-11-03T01:15:07.380", - "lastModified": "2022-03-17T19:20:47.287", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -91,16 +91,16 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", - "versionEndExcluding": "78.15", - "matchCriteriaId": "FE7CF283-671F-4E2D-B39A-2C1FB1D75765" + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", + "versionStartIncluding": "91.0", + "versionEndExcluding": "91.2", + "matchCriteriaId": "CF07F56E-2A0C-46C8-B6D9-4F2B6518FA49" }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", - "versionStartIncluding": "91.0", - "versionEndExcluding": "91.2", - "matchCriteriaId": "1D09BF8C-3237-4A8A-9B93-E572B596ECFA" + "versionEndExcluding": "78.15", + "matchCriteriaId": "FE7CF283-671F-4E2D-B39A-2C1FB1D75765" }, { "vulnerable": true, diff --git a/CVE-2021/CVE-2021-385xx/CVE-2021-38500.json b/CVE-2021/CVE-2021-385xx/CVE-2021-38500.json index 3775d442b3f..c6c82052a8d 100644 --- a/CVE-2021/CVE-2021-385xx/CVE-2021-38500.json +++ b/CVE-2021/CVE-2021-385xx/CVE-2021-38500.json @@ -2,7 +2,7 @@ "id": "CVE-2021-38500", "sourceIdentifier": "security@mozilla.org", "published": "2021-11-03T01:15:07.570", - "lastModified": "2022-03-17T19:36:32.060", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -91,16 +91,16 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", - "versionEndExcluding": "78.15", - "matchCriteriaId": "FE7CF283-671F-4E2D-B39A-2C1FB1D75765" + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", + "versionStartIncluding": "91.0", + "versionEndExcluding": "91.2", + "matchCriteriaId": "CF07F56E-2A0C-46C8-B6D9-4F2B6518FA49" }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", - "versionStartIncluding": "91.0", - "versionEndExcluding": "91.2", - "matchCriteriaId": "1D09BF8C-3237-4A8A-9B93-E572B596ECFA" + "versionEndExcluding": "78.15", + "matchCriteriaId": "FE7CF283-671F-4E2D-B39A-2C1FB1D75765" }, { "vulnerable": true, diff --git a/CVE-2021/CVE-2021-44xx/CVE-2021-4434.json b/CVE-2021/CVE-2021-44xx/CVE-2021-4434.json index 120f91313c2..5159b3e208c 100644 --- a/CVE-2021/CVE-2021-44xx/CVE-2021-4434.json +++ b/CVE-2021/CVE-2021-44xx/CVE-2021-4434.json @@ -2,8 +2,8 @@ "id": "CVE-2021-4434", "sourceIdentifier": "security@wordfence.com", "published": "2024-01-17T09:15:25.980", - "lastModified": "2024-01-24T16:02:27.587", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-21T12:35:00.840", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -69,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-384xx/CVE-2022-38472.json b/CVE-2022/CVE-2022-384xx/CVE-2022-38472.json index 231a62c8780..ef694517e80 100644 --- a/CVE-2022/CVE-2022-384xx/CVE-2022-38472.json +++ b/CVE-2022/CVE-2022-384xx/CVE-2022-38472.json @@ -2,7 +2,7 @@ "id": "CVE-2022-38472", "sourceIdentifier": "security@mozilla.org", "published": "2022-12-22T20:15:36.237", - "lastModified": "2023-01-03T21:13:48.670", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -66,10 +66,10 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "versionStartIncluding": "102.0", "versionEndExcluding": "102.2", - "matchCriteriaId": "2E797275-F2D5-434F-8BBD-405B454A9F29" + "matchCriteriaId": "F41299AA-8263-4589-A162-B01BFF5D0125" }, { "vulnerable": true, diff --git a/CVE-2022/CVE-2022-384xx/CVE-2022-38473.json b/CVE-2022/CVE-2022-384xx/CVE-2022-38473.json index 6736ceb4fb0..84374b7870b 100644 --- a/CVE-2022/CVE-2022-384xx/CVE-2022-38473.json +++ b/CVE-2022/CVE-2022-384xx/CVE-2022-38473.json @@ -2,7 +2,7 @@ "id": "CVE-2022-38473", "sourceIdentifier": "security@mozilla.org", "published": "2022-12-22T20:15:36.483", - "lastModified": "2023-01-03T21:12:27.323", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -66,16 +66,16 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", - "versionEndExcluding": "91.13", - "matchCriteriaId": "04DB1F84-4152-40DE-967D-A6FD35AB93DC" + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", + "versionStartIncluding": "102.0", + "versionEndExcluding": "102.2", + "matchCriteriaId": "F41299AA-8263-4589-A162-B01BFF5D0125" }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", - "versionStartIncluding": "102.0", - "versionEndExcluding": "102.2", - "matchCriteriaId": "2E797275-F2D5-434F-8BBD-405B454A9F29" + "versionEndExcluding": "91.13", + "matchCriteriaId": "04DB1F84-4152-40DE-967D-A6FD35AB93DC" }, { "vulnerable": true, diff --git a/CVE-2022/CVE-2022-384xx/CVE-2022-38478.json b/CVE-2022/CVE-2022-384xx/CVE-2022-38478.json index cafd123428d..06302754ecf 100644 --- a/CVE-2022/CVE-2022-384xx/CVE-2022-38478.json +++ b/CVE-2022/CVE-2022-384xx/CVE-2022-38478.json @@ -2,7 +2,7 @@ "id": "CVE-2022-38478", "sourceIdentifier": "security@mozilla.org", "published": "2022-12-22T20:15:37.587", - "lastModified": "2022-12-31T02:35:22.677", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -66,16 +66,16 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", - "versionEndExcluding": "91.13", - "matchCriteriaId": "04DB1F84-4152-40DE-967D-A6FD35AB93DC" + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", + "versionStartIncluding": "102.0", + "versionEndExcluding": "102.2", + "matchCriteriaId": "F41299AA-8263-4589-A162-B01BFF5D0125" }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", - "versionStartIncluding": "102.0", - "versionEndExcluding": "102.2", - "matchCriteriaId": "2E797275-F2D5-434F-8BBD-405B454A9F29" + "versionEndExcluding": "91.13", + "matchCriteriaId": "04DB1F84-4152-40DE-967D-A6FD35AB93DC" }, { "vulnerable": true, diff --git a/CVE-2023/CVE-2023-287xx/CVE-2023-28738.json b/CVE-2023/CVE-2023-287xx/CVE-2023-28738.json index 9c205c7704f..5d005a21b7d 100644 --- a/CVE-2023/CVE-2023-287xx/CVE-2023-28738.json +++ b/CVE-2023/CVE-2023-287xx/CVE-2023-28738.json @@ -2,8 +2,8 @@ "id": "CVE-2023-28738", "sourceIdentifier": "secure@intel.com", "published": "2024-01-19T20:15:09.397", - "lastModified": "2024-01-30T15:18:46.843", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-21T12:35:02.883", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -79,6 +79,16 @@ "value": "CWE-20" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-116" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-343xx/CVE-2023-34348.json b/CVE-2023/CVE-2023-343xx/CVE-2023-34348.json index be8b5ca2dc2..4c51e0a617c 100644 --- a/CVE-2023/CVE-2023-343xx/CVE-2023-34348.json +++ b/CVE-2023/CVE-2023-343xx/CVE-2023-34348.json @@ -2,8 +2,8 @@ "id": "CVE-2023-34348", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2024-01-18T18:15:08.457", - "lastModified": "2024-01-26T14:58:57.713", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-21T12:35:03.677", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -79,6 +79,16 @@ "value": "CWE-703" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-754" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-40xx/CVE-2023-4045.json b/CVE-2023/CVE-2023-40xx/CVE-2023-4045.json index c4f15ed9c14..4650041ecb0 100644 --- a/CVE-2023/CVE-2023-40xx/CVE-2023-4045.json +++ b/CVE-2023/CVE-2023-40xx/CVE-2023-4045.json @@ -2,7 +2,7 @@ "id": "CVE-2023-4045", "sourceIdentifier": "security@mozilla.org", "published": "2023-08-01T15:15:09.783", - "lastModified": "2023-08-09T21:15:11.137", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -62,17 +62,17 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", - "versionStartIncluding": "102.0", - "versionEndExcluding": "102.14", - "matchCriteriaId": "D49AC718-4650-4F1B-BD3C-C4780DD68015" + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", + "versionStartIncluding": "115.0", + "versionEndExcluding": "115.1", + "matchCriteriaId": "EACD3AEC-1B8F-41F1-9AFF-4FED63609109" }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", - "versionStartIncluding": "115.0", - "versionEndExcluding": "115.1", - "matchCriteriaId": "0D71A08C-44F2-41BF-8074-829EAEE37EEC" + "versionStartIncluding": "102.0", + "versionEndExcluding": "102.14", + "matchCriteriaId": "D49AC718-4650-4F1B-BD3C-C4780DD68015" } ] } diff --git a/CVE-2023/CVE-2023-40xx/CVE-2023-4046.json b/CVE-2023/CVE-2023-40xx/CVE-2023-4046.json index f75f542d77f..78d9558ba16 100644 --- a/CVE-2023/CVE-2023-40xx/CVE-2023-4046.json +++ b/CVE-2023/CVE-2023-40xx/CVE-2023-4046.json @@ -2,7 +2,7 @@ "id": "CVE-2023-4046", "sourceIdentifier": "security@mozilla.org", "published": "2023-08-01T15:15:09.847", - "lastModified": "2023-08-09T21:15:11.253", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -62,17 +62,17 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", - "versionStartIncluding": "102.0", - "versionEndExcluding": "102.14", - "matchCriteriaId": "D49AC718-4650-4F1B-BD3C-C4780DD68015" + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", + "versionStartIncluding": "115.0", + "versionEndExcluding": "115.1", + "matchCriteriaId": "EACD3AEC-1B8F-41F1-9AFF-4FED63609109" }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", - "versionStartIncluding": "115.0", - "versionEndExcluding": "115.1", - "matchCriteriaId": "0D71A08C-44F2-41BF-8074-829EAEE37EEC" + "versionStartIncluding": "102.0", + "versionEndExcluding": "102.14", + "matchCriteriaId": "D49AC718-4650-4F1B-BD3C-C4780DD68015" } ] } diff --git a/CVE-2023/CVE-2023-40xx/CVE-2023-4047.json b/CVE-2023/CVE-2023-40xx/CVE-2023-4047.json index cb508e931bd..003f77b4c20 100644 --- a/CVE-2023/CVE-2023-40xx/CVE-2023-4047.json +++ b/CVE-2023/CVE-2023-40xx/CVE-2023-4047.json @@ -2,7 +2,7 @@ "id": "CVE-2023-4047", "sourceIdentifier": "security@mozilla.org", "published": "2023-08-01T15:15:09.903", - "lastModified": "2023-08-09T21:15:11.370", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -62,17 +62,17 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", - "versionStartIncluding": "102.0", - "versionEndExcluding": "102.14", - "matchCriteriaId": "D49AC718-4650-4F1B-BD3C-C4780DD68015" + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", + "versionStartIncluding": "115.0", + "versionEndExcluding": "115.1", + "matchCriteriaId": "EACD3AEC-1B8F-41F1-9AFF-4FED63609109" }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", - "versionStartIncluding": "115.0", - "versionEndExcluding": "115.1", - "matchCriteriaId": "0D71A08C-44F2-41BF-8074-829EAEE37EEC" + "versionStartIncluding": "102.0", + "versionEndExcluding": "102.14", + "matchCriteriaId": "D49AC718-4650-4F1B-BD3C-C4780DD68015" } ] } diff --git a/CVE-2023/CVE-2023-40xx/CVE-2023-4048.json b/CVE-2023/CVE-2023-40xx/CVE-2023-4048.json index cd2c398fa40..b331c286508 100644 --- a/CVE-2023/CVE-2023-40xx/CVE-2023-4048.json +++ b/CVE-2023/CVE-2023-40xx/CVE-2023-4048.json @@ -2,7 +2,7 @@ "id": "CVE-2023-4048", "sourceIdentifier": "security@mozilla.org", "published": "2023-08-01T15:15:09.967", - "lastModified": "2023-08-11T20:03:47.233", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -62,17 +62,17 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", - "versionStartIncluding": "102.0", - "versionEndExcluding": "102.14", - "matchCriteriaId": "D49AC718-4650-4F1B-BD3C-C4780DD68015" + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", + "versionStartIncluding": "115.0", + "versionEndExcluding": "115.1", + "matchCriteriaId": "EACD3AEC-1B8F-41F1-9AFF-4FED63609109" }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", - "versionStartIncluding": "115.0", - "versionEndExcluding": "115.1", - "matchCriteriaId": "0D71A08C-44F2-41BF-8074-829EAEE37EEC" + "versionStartIncluding": "102.0", + "versionEndExcluding": "102.14", + "matchCriteriaId": "D49AC718-4650-4F1B-BD3C-C4780DD68015" } ] } diff --git a/CVE-2023/CVE-2023-40xx/CVE-2023-4049.json b/CVE-2023/CVE-2023-40xx/CVE-2023-4049.json index b46f617e212..df4a6899a49 100644 --- a/CVE-2023/CVE-2023-40xx/CVE-2023-4049.json +++ b/CVE-2023/CVE-2023-40xx/CVE-2023-4049.json @@ -2,7 +2,7 @@ "id": "CVE-2023-4049", "sourceIdentifier": "security@mozilla.org", "published": "2023-08-01T15:15:10.030", - "lastModified": "2023-08-09T21:15:11.627", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -62,17 +62,17 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", - "versionStartIncluding": "102.0", - "versionEndExcluding": "102.14", - "matchCriteriaId": "D49AC718-4650-4F1B-BD3C-C4780DD68015" + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", + "versionStartIncluding": "115.0", + "versionEndExcluding": "115.1", + "matchCriteriaId": "EACD3AEC-1B8F-41F1-9AFF-4FED63609109" }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", - "versionStartIncluding": "115.0", - "versionEndExcluding": "115.1", - "matchCriteriaId": "0D71A08C-44F2-41BF-8074-829EAEE37EEC" + "versionStartIncluding": "102.0", + "versionEndExcluding": "102.14", + "matchCriteriaId": "D49AC718-4650-4F1B-BD3C-C4780DD68015" } ] } diff --git a/CVE-2023/CVE-2023-40xx/CVE-2023-4050.json b/CVE-2023/CVE-2023-40xx/CVE-2023-4050.json index 1fd5d9dc70f..80420c5a958 100644 --- a/CVE-2023/CVE-2023-40xx/CVE-2023-4050.json +++ b/CVE-2023/CVE-2023-40xx/CVE-2023-4050.json @@ -2,7 +2,7 @@ "id": "CVE-2023-4050", "sourceIdentifier": "security@mozilla.org", "published": "2023-08-01T15:15:10.090", - "lastModified": "2023-08-09T21:15:11.723", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -62,17 +62,17 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", - "versionStartIncluding": "102.0", - "versionEndExcluding": "102.14", - "matchCriteriaId": "D49AC718-4650-4F1B-BD3C-C4780DD68015" + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", + "versionStartIncluding": "115.0", + "versionEndExcluding": "115.1", + "matchCriteriaId": "EACD3AEC-1B8F-41F1-9AFF-4FED63609109" }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", - "versionStartIncluding": "115.0", - "versionEndExcluding": "115.1", - "matchCriteriaId": "0D71A08C-44F2-41BF-8074-829EAEE37EEC" + "versionStartIncluding": "102.0", + "versionEndExcluding": "102.14", + "matchCriteriaId": "D49AC718-4650-4F1B-BD3C-C4780DD68015" } ] } diff --git a/CVE-2023/CVE-2023-40xx/CVE-2023-4054.json b/CVE-2023/CVE-2023-40xx/CVE-2023-4054.json index 5b3153c36c8..bfb867798cb 100644 --- a/CVE-2023/CVE-2023-40xx/CVE-2023-4054.json +++ b/CVE-2023/CVE-2023-40xx/CVE-2023-4054.json @@ -2,7 +2,7 @@ "id": "CVE-2023-4054", "sourceIdentifier": "security@mozilla.org", "published": "2023-08-01T16:15:09.890", - "lastModified": "2023-08-07T14:51:09.667", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -78,17 +78,17 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", - "versionStartIncluding": "102.0", - "versionEndExcluding": "102.14", - "matchCriteriaId": "D49AC718-4650-4F1B-BD3C-C4780DD68015" + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", + "versionStartIncluding": "115.0", + "versionEndExcluding": "115.1", + "matchCriteriaId": "EACD3AEC-1B8F-41F1-9AFF-4FED63609109" }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", - "versionStartIncluding": "115.0", - "versionEndExcluding": "115.1", - "matchCriteriaId": "0D71A08C-44F2-41BF-8074-829EAEE37EEC" + "versionStartIncluding": "102.0", + "versionEndExcluding": "102.14", + "matchCriteriaId": "D49AC718-4650-4F1B-BD3C-C4780DD68015" } ] } diff --git a/CVE-2023/CVE-2023-40xx/CVE-2023-4055.json b/CVE-2023/CVE-2023-40xx/CVE-2023-4055.json index 9d19b8659ae..35aacd76c85 100644 --- a/CVE-2023/CVE-2023-40xx/CVE-2023-4055.json +++ b/CVE-2023/CVE-2023-40xx/CVE-2023-4055.json @@ -2,7 +2,7 @@ "id": "CVE-2023-4055", "sourceIdentifier": "security@mozilla.org", "published": "2023-08-01T16:15:09.967", - "lastModified": "2023-08-09T21:15:11.820", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -66,17 +66,17 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", - "versionStartIncluding": "102.0", - "versionEndExcluding": "102.14", - "matchCriteriaId": "D49AC718-4650-4F1B-BD3C-C4780DD68015" + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", + "versionStartIncluding": "115.0", + "versionEndExcluding": "115.1", + "matchCriteriaId": "EACD3AEC-1B8F-41F1-9AFF-4FED63609109" }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", - "versionStartIncluding": "115.0", - "versionEndExcluding": "115.1", - "matchCriteriaId": "0D71A08C-44F2-41BF-8074-829EAEE37EEC" + "versionStartIncluding": "102.0", + "versionEndExcluding": "102.14", + "matchCriteriaId": "D49AC718-4650-4F1B-BD3C-C4780DD68015" } ] } diff --git a/CVE-2023/CVE-2023-40xx/CVE-2023-4056.json b/CVE-2023/CVE-2023-40xx/CVE-2023-4056.json index e744416e93b..71aa36cae65 100644 --- a/CVE-2023/CVE-2023-40xx/CVE-2023-4056.json +++ b/CVE-2023/CVE-2023-40xx/CVE-2023-4056.json @@ -2,7 +2,7 @@ "id": "CVE-2023-4056", "sourceIdentifier": "security@mozilla.org", "published": "2023-08-01T16:15:10.020", - "lastModified": "2023-08-11T20:19:43.687", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -66,17 +66,17 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", - "versionStartIncluding": "102.0", - "versionEndExcluding": "102.14", - "matchCriteriaId": "D49AC718-4650-4F1B-BD3C-C4780DD68015" + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", + "versionStartIncluding": "115.0", + "versionEndExcluding": "115.1", + "matchCriteriaId": "EACD3AEC-1B8F-41F1-9AFF-4FED63609109" }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", - "versionStartIncluding": "115.0", - "versionEndExcluding": "115.1", - "matchCriteriaId": "0D71A08C-44F2-41BF-8074-829EAEE37EEC" + "versionStartIncluding": "102.0", + "versionEndExcluding": "102.14", + "matchCriteriaId": "D49AC718-4650-4F1B-BD3C-C4780DD68015" } ] } diff --git a/CVE-2023/CVE-2023-45xx/CVE-2023-4573.json b/CVE-2023/CVE-2023-45xx/CVE-2023-4573.json index e8ded56a24a..3dbc0fd79a4 100644 --- a/CVE-2023/CVE-2023-45xx/CVE-2023-4573.json +++ b/CVE-2023/CVE-2023-45xx/CVE-2023-4573.json @@ -2,7 +2,7 @@ "id": "CVE-2023-4573", "sourceIdentifier": "security@mozilla.org", "published": "2023-09-11T08:15:07.847", - "lastModified": "2023-09-13T11:15:10.287", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -66,16 +66,16 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", - "versionEndExcluding": "102.15", - "matchCriteriaId": "066F8E6C-E629-4F70-8925-CB5C901E3A07" + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", + "versionStartIncluding": "115.0", + "versionEndExcluding": "115.2", + "matchCriteriaId": "98C163DC-8C12-43DA-8B27-64FBD3120547" }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", - "versionStartIncluding": "115.0", - "versionEndExcluding": "115.2", - "matchCriteriaId": "67258574-7F75-45A3-A8B9-6AF93E20C1CC" + "versionEndExcluding": "102.15", + "matchCriteriaId": "066F8E6C-E629-4F70-8925-CB5C901E3A07" }, { "vulnerable": true, diff --git a/CVE-2023/CVE-2023-45xx/CVE-2023-4574.json b/CVE-2023/CVE-2023-45xx/CVE-2023-4574.json index d724f7e0e2a..cc309341894 100644 --- a/CVE-2023/CVE-2023-45xx/CVE-2023-4574.json +++ b/CVE-2023/CVE-2023-45xx/CVE-2023-4574.json @@ -2,7 +2,7 @@ "id": "CVE-2023-4574", "sourceIdentifier": "security@mozilla.org", "published": "2023-09-11T09:15:09.087", - "lastModified": "2023-09-13T11:15:10.507", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -66,16 +66,16 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", - "versionEndExcluding": "102.15", - "matchCriteriaId": "066F8E6C-E629-4F70-8925-CB5C901E3A07" + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", + "versionStartIncluding": "115.0", + "versionEndExcluding": "115.2", + "matchCriteriaId": "98C163DC-8C12-43DA-8B27-64FBD3120547" }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", - "versionStartIncluding": "115.0", - "versionEndExcluding": "115.2", - "matchCriteriaId": "67258574-7F75-45A3-A8B9-6AF93E20C1CC" + "versionEndExcluding": "102.15", + "matchCriteriaId": "066F8E6C-E629-4F70-8925-CB5C901E3A07" }, { "vulnerable": true, diff --git a/CVE-2023/CVE-2023-45xx/CVE-2023-4575.json b/CVE-2023/CVE-2023-45xx/CVE-2023-4575.json index befa7387c68..5706c43de84 100644 --- a/CVE-2023/CVE-2023-45xx/CVE-2023-4575.json +++ b/CVE-2023/CVE-2023-45xx/CVE-2023-4575.json @@ -2,7 +2,7 @@ "id": "CVE-2023-4575", "sourceIdentifier": "security@mozilla.org", "published": "2023-09-11T09:15:09.143", - "lastModified": "2023-09-13T11:15:10.597", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -66,16 +66,16 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", - "versionEndExcluding": "102.15", - "matchCriteriaId": "066F8E6C-E629-4F70-8925-CB5C901E3A07" + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", + "versionStartIncluding": "115.0", + "versionEndExcluding": "115.2", + "matchCriteriaId": "98C163DC-8C12-43DA-8B27-64FBD3120547" }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", - "versionStartIncluding": "115.0", - "versionEndExcluding": "115.2", - "matchCriteriaId": "67258574-7F75-45A3-A8B9-6AF93E20C1CC" + "versionEndExcluding": "102.15", + "matchCriteriaId": "066F8E6C-E629-4F70-8925-CB5C901E3A07" }, { "vulnerable": true, diff --git a/CVE-2023/CVE-2023-45xx/CVE-2023-4576.json b/CVE-2023/CVE-2023-45xx/CVE-2023-4576.json index ac1d0a937ba..74b35a3c8e2 100644 --- a/CVE-2023/CVE-2023-45xx/CVE-2023-4576.json +++ b/CVE-2023/CVE-2023-45xx/CVE-2023-4576.json @@ -2,7 +2,7 @@ "id": "CVE-2023-4576", "sourceIdentifier": "security@mozilla.org", "published": "2023-09-11T09:15:09.217", - "lastModified": "2023-09-13T11:15:10.727", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -67,16 +67,16 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", - "versionEndExcluding": "102.15", - "matchCriteriaId": "066F8E6C-E629-4F70-8925-CB5C901E3A07" + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", + "versionStartIncluding": "115.0", + "versionEndExcluding": "115.2", + "matchCriteriaId": "98C163DC-8C12-43DA-8B27-64FBD3120547" }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", - "versionStartIncluding": "115.0", - "versionEndExcluding": "115.2", - "matchCriteriaId": "67258574-7F75-45A3-A8B9-6AF93E20C1CC" + "versionEndExcluding": "102.15", + "matchCriteriaId": "066F8E6C-E629-4F70-8925-CB5C901E3A07" }, { "vulnerable": true, diff --git a/CVE-2023/CVE-2023-45xx/CVE-2023-4581.json b/CVE-2023/CVE-2023-45xx/CVE-2023-4581.json index be387d7c537..e9edacb4b25 100644 --- a/CVE-2023/CVE-2023-45xx/CVE-2023-4581.json +++ b/CVE-2023/CVE-2023-45xx/CVE-2023-4581.json @@ -2,7 +2,7 @@ "id": "CVE-2023-4581", "sourceIdentifier": "security@mozilla.org", "published": "2023-09-11T09:15:09.550", - "lastModified": "2023-09-14T03:52:57.273", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -66,16 +66,16 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", - "versionEndExcluding": "102.15", - "matchCriteriaId": "066F8E6C-E629-4F70-8925-CB5C901E3A07" + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", + "versionStartIncluding": "115.0", + "versionEndExcluding": "115.2", + "matchCriteriaId": "98C163DC-8C12-43DA-8B27-64FBD3120547" }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", - "versionStartIncluding": "115.0", - "versionEndExcluding": "115.2", - "matchCriteriaId": "67258574-7F75-45A3-A8B9-6AF93E20C1CC" + "versionEndExcluding": "102.15", + "matchCriteriaId": "066F8E6C-E629-4F70-8925-CB5C901E3A07" }, { "vulnerable": true, diff --git a/CVE-2023/CVE-2023-45xx/CVE-2023-4584.json b/CVE-2023/CVE-2023-45xx/CVE-2023-4584.json index 34aa7092353..2749d1de91c 100644 --- a/CVE-2023/CVE-2023-45xx/CVE-2023-4584.json +++ b/CVE-2023/CVE-2023-45xx/CVE-2023-4584.json @@ -2,7 +2,7 @@ "id": "CVE-2023-4584", "sourceIdentifier": "security@mozilla.org", "published": "2023-09-11T09:15:09.740", - "lastModified": "2023-09-14T03:45:38.877", + "lastModified": "2024-10-21T13:55:03.510", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -66,16 +66,16 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", - "versionEndExcluding": "102.15", - "matchCriteriaId": "066F8E6C-E629-4F70-8925-CB5C901E3A07" + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", + "versionStartIncluding": "115.0", + "versionEndExcluding": "115.2", + "matchCriteriaId": "98C163DC-8C12-43DA-8B27-64FBD3120547" }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", - "versionStartIncluding": "115.0", - "versionEndExcluding": "115.2", - "matchCriteriaId": "67258574-7F75-45A3-A8B9-6AF93E20C1CC" + "versionEndExcluding": "102.15", + "matchCriteriaId": "066F8E6C-E629-4F70-8925-CB5C901E3A07" }, { "vulnerable": true, diff --git a/CVE-2023/CVE-2023-529xx/CVE-2023-52917.json b/CVE-2023/CVE-2023-529xx/CVE-2023-52917.json new file mode 100644 index 00000000000..6e9573a193a --- /dev/null +++ b/CVE-2023/CVE-2023-529xx/CVE-2023-52917.json @@ -0,0 +1,45 @@ +{ + "id": "CVE-2023-52917", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2024-10-21T13:15:02.230", + "lastModified": "2024-10-21T13:15:02.230", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nntb: intel: Fix the NULL vs IS_ERR() bug for debugfs_create_dir()\n\nThe debugfs_create_dir() function returns error pointers.\nIt never returns NULL. So use IS_ERR() to check it." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/16e5bed6c1883b19f9fcbdff996aa3381954d5f3", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/7cbd6d7fb9ba2be03978809c848e2e50eaeead2c", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/a429158f2e0a7a03eb67fd5e204e1f6735c725aa", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/b66bf833e72a1e23d7ccafc0f8f74e80f8c357b5", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/babba8595d1e5d57313a6187f3e51aceacc6881a", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/e229897d373a87ee09ec5cc4ecd4bb2f895fc16b", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/ef7e34237e2612b116a84c9640628a6f7a0d693e", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-64xx/CVE-2023-6450.json b/CVE-2023/CVE-2023-64xx/CVE-2023-6450.json index f45c5f648e0..0f75e266d48 100644 --- a/CVE-2023/CVE-2023-64xx/CVE-2023-6450.json +++ b/CVE-2023/CVE-2023-64xx/CVE-2023-6450.json @@ -2,8 +2,8 @@ "id": "CVE-2023-6450", "sourceIdentifier": "psirt@lenovo.com", "published": "2024-01-19T20:15:12.853", - "lastModified": "2024-01-26T15:59:00.420", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-21T12:35:05.010", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -59,6 +59,16 @@ "value": "CWE-400" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-404" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-07xx/CVE-2024-0716.json b/CVE-2024/CVE-2024-07xx/CVE-2024-0716.json index e1e046c9def..8c04de3a777 100644 --- a/CVE-2024/CVE-2024-07xx/CVE-2024-0716.json +++ b/CVE-2024/CVE-2024-07xx/CVE-2024-0716.json @@ -2,7 +2,7 @@ "id": "CVE-2024-0716", "sourceIdentifier": "cna@vuldb.com", "published": "2024-01-19T15:15:09.240", - "lastModified": "2024-05-17T02:34:53.103", + "lastModified": "2024-10-21T12:35:06.143", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -104,6 +104,16 @@ "value": "CWE-200" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-532" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-100xx/CVE-2024-10021.json b/CVE-2024/CVE-2024-100xx/CVE-2024-10021.json index b25fda2a058..6305d9974a8 100644 --- a/CVE-2024/CVE-2024-100xx/CVE-2024-10021.json +++ b/CVE-2024/CVE-2024-100xx/CVE-2024-10021.json @@ -2,8 +2,8 @@ "id": "CVE-2024-10021", "sourceIdentifier": "cna@vuldb.com", "published": "2024-10-16T12:15:07.663", - "lastModified": "2024-10-16T16:38:14.557", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-21T13:13:25.677", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -120,26 +140,63 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:code-projects:pharmacy_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "9943605C-820A-4C9A-8A5E-1BA71F57F048" + } + ] + } + ] + } + ], "references": [ { "url": "https://code-projects.org/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://gist.github.com/higordiego/439f2af836c2c7d6075ba9de2e1169da", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.280556", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.280556", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.424334", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-100xx/CVE-2024-10022.json b/CVE-2024/CVE-2024-100xx/CVE-2024-10022.json index c2265efc017..d0587c71a0f 100644 --- a/CVE-2024/CVE-2024-100xx/CVE-2024-10022.json +++ b/CVE-2024/CVE-2024-100xx/CVE-2024-10022.json @@ -2,8 +2,8 @@ "id": "CVE-2024-10022", "sourceIdentifier": "cna@vuldb.com", "published": "2024-10-16T12:15:08.163", - "lastModified": "2024-10-16T16:38:14.557", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-21T13:14:02.203", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -120,26 +140,63 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:code-projects:pharmacy_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "9943605C-820A-4C9A-8A5E-1BA71F57F048" + } + ] + } + ] + } + ], "references": [ { "url": "https://code-projects.org/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://gist.github.com/higordiego/2bd0a94e480906a60ce83b8a4ec26957", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.280557", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.280557", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.424337", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-100xx/CVE-2024-10023.json b/CVE-2024/CVE-2024-100xx/CVE-2024-10023.json index 755db3602e1..91cf7fae68b 100644 --- a/CVE-2024/CVE-2024-100xx/CVE-2024-10023.json +++ b/CVE-2024/CVE-2024-100xx/CVE-2024-10023.json @@ -2,8 +2,8 @@ "id": "CVE-2024-10023", "sourceIdentifier": "cna@vuldb.com", "published": "2024-10-16T13:15:13.350", - "lastModified": "2024-10-16T16:38:14.557", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-21T13:14:37.300", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -109,6 +129,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -120,26 +150,63 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:code-projects:pharmacy_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "9943605C-820A-4C9A-8A5E-1BA71F57F048" + } + ] + } + ] + } + ], "references": [ { "url": "https://code-projects.org/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://gist.github.com/higordiego/01a35a20a4e20e937d384b677c000921", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.280558", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.280558", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.424483", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-100xx/CVE-2024-10024.json b/CVE-2024/CVE-2024-100xx/CVE-2024-10024.json index d1d9b9b69bc..6c9eb09a990 100644 --- a/CVE-2024/CVE-2024-100xx/CVE-2024-10024.json +++ b/CVE-2024/CVE-2024-100xx/CVE-2024-10024.json @@ -2,8 +2,8 @@ "id": "CVE-2024-10024", "sourceIdentifier": "cna@vuldb.com", "published": "2024-10-16T13:15:13.650", - "lastModified": "2024-10-16T16:38:14.557", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-21T13:15:01.730", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -120,26 +140,63 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:code-projects:pharmacy_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "9943605C-820A-4C9A-8A5E-1BA71F57F048" + } + ] + } + ] + } + ], "references": [ { "url": "https://code-projects.org/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://gist.github.com/higordiego/b0083f7f12dee245c2fbe7102e31d9a4", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.280559", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.280559", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.424529", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-211xx/CVE-2024-21172.json b/CVE-2024/CVE-2024-211xx/CVE-2024-21172.json index e2331d5d08d..047267269f4 100644 --- a/CVE-2024/CVE-2024-211xx/CVE-2024-21172.json +++ b/CVE-2024/CVE-2024-211xx/CVE-2024-21172.json @@ -2,8 +2,8 @@ "id": "CVE-2024-21172", "sourceIdentifier": "secalert_us@oracle.com", "published": "2024-10-15T20:15:05.770", - "lastModified": "2024-10-16T16:38:43.170", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-21T12:59:49.070", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,10 +39,52 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:hospitality_opera_5:5.6.19.19:*:*:*:*:*:*:*", + "matchCriteriaId": "4879A9DD-0353-4889-85E7-9339A8634EF4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:hospitality_opera_5:5.6.25.8:*:*:*:*:*:*:*", + "matchCriteriaId": "462CD9C3-D903-4433-8537-E930BEAEE371" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:hospitality_opera_5:5.6.26.4:*:*:*:*:*:*:*", + "matchCriteriaId": "111E62ED-BF45-4760-BAF6-73D3161F15E1" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.oracle.com/security-alerts/cpuoct2024.html", - "source": "secalert_us@oracle.com" + "source": "secalert_us@oracle.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-431xx/CVE-2024-43167.json b/CVE-2024/CVE-2024-431xx/CVE-2024-43167.json index 442103cfa5f..5e22db48f77 100644 --- a/CVE-2024/CVE-2024-431xx/CVE-2024-43167.json +++ b/CVE-2024/CVE-2024-431xx/CVE-2024-43167.json @@ -1,14 +1,14 @@ { "id": "CVE-2024-43167", - "sourceIdentifier": "secalert@redhat.com", + "sourceIdentifier": "sep@nlnetlabs.nl", "published": "2024-08-12T13:38:35.927", - "lastModified": "2024-08-12T13:41:36.517", + "lastModified": "2024-10-21T12:15:03.837", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "A NULL pointer dereference flaw was found in the ub_ctx_set_fwd function in Unbound. This issue could allow an attacker who can invoke specific sequences of API calls to cause a segmentation fault. When certain API functions such as ub_ctx_set_fwd and ub_ctx_resolvconf are called in a particular order, the program attempts to read from a NULL pointer, leading to a crash. This issue can result in a denial of service by causing the application to terminate unexpectedly." + "value": "DISPUTE NOTE: this issue does not pose a security risk as it (according to analysis by the original software developer, NLnet Labs) falls within the expected functionality and security controls of the application. Red Hat has made a claim that there is a security risk within Red Hat products. NLnet Labs has no further information about the claim, and suggests that affected Red Hat customers refer to available Red Hat documentation or support channels. ORIGINAL DESCRIPTION: A NULL pointer dereference flaw was found in the ub_ctx_set_fwd function in Unbound. This issue could allow an attacker who can invoke specific sequences of API calls to cause a segmentation fault. When certain API functions such as ub_ctx_set_fwd and ub_ctx_resolvconf are called in a particular order, the program attempts to read from a NULL pointer, leading to a crash. This issue can result in a denial of service by causing the application to terminate unexpectedly." }, { "lang": "es", @@ -18,7 +18,7 @@ "metrics": { "cvssMetricV31": [ { - "source": "secalert@redhat.com", + "source": "sep@nlnetlabs.nl", "type": "Secondary", "cvssData": { "version": "3.1", @@ -41,8 +41,8 @@ }, "weaknesses": [ { - "source": "secalert@redhat.com", - "type": "Primary", + "source": "sep@nlnetlabs.nl", + "type": "Secondary", "description": [ { "lang": "en", @@ -54,19 +54,19 @@ "references": [ { "url": "https://access.redhat.com/security/cve/CVE-2024-43167", - "source": "secalert@redhat.com" + "source": "sep@nlnetlabs.nl" }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2303456", - "source": "secalert@redhat.com" + "source": "sep@nlnetlabs.nl" }, { "url": "https://github.com/NLnetLabs/unbound/issues/1072", - "source": "secalert@redhat.com" + "source": "sep@nlnetlabs.nl" }, { "url": "https://github.com/NLnetLabs/unbound/pull/1073/files", - "source": "secalert@redhat.com" + "source": "sep@nlnetlabs.nl" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-431xx/CVE-2024-43168.json b/CVE-2024/CVE-2024-431xx/CVE-2024-43168.json index 96bbbf6a5de..b435a2f050e 100644 --- a/CVE-2024/CVE-2024-431xx/CVE-2024-43168.json +++ b/CVE-2024/CVE-2024-431xx/CVE-2024-43168.json @@ -1,14 +1,14 @@ { "id": "CVE-2024-43168", - "sourceIdentifier": "secalert@redhat.com", + "sourceIdentifier": "sep@nlnetlabs.nl", "published": "2024-08-12T13:38:36.187", - "lastModified": "2024-08-12T13:41:36.517", + "lastModified": "2024-10-21T12:15:04.327", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "A heap-buffer-overflow flaw was found in the cfg_mark_ports function within Unbound's config_file.c, which can lead to memory corruption. This issue could allow an attacker with local access to provide specially crafted input, potentially causing the application to crash or allowing arbitrary code execution. This could result in a denial of service or unauthorized actions on the system." + "value": "DISPUTE NOTE: this issue does not pose a security risk as it (according to analysis by the original software developer, NLnet Labs) falls within the expected functionality and security controls of the application. Red Hat has made a claim that there is a security risk within Red Hat products. NLnet Labs has no further information about the claim, and suggests that affected Red Hat customers refer to available Red Hat documentation or support channels. ORIGINAL DESCRIPTION: A heap-buffer-overflow flaw was found in the cfg_mark_ports function within Unbound's config_file.c, which can lead to memory corruption. This issue could allow an attacker with local access to provide specially crafted input, potentially causing the application to crash or allowing arbitrary code execution. This could result in a denial of service or unauthorized actions on the system." }, { "lang": "es", @@ -18,7 +18,7 @@ "metrics": { "cvssMetricV31": [ { - "source": "secalert@redhat.com", + "source": "sep@nlnetlabs.nl", "type": "Secondary", "cvssData": { "version": "3.1", @@ -41,8 +41,8 @@ }, "weaknesses": [ { - "source": "secalert@redhat.com", - "type": "Primary", + "source": "sep@nlnetlabs.nl", + "type": "Secondary", "description": [ { "lang": "en", @@ -54,19 +54,19 @@ "references": [ { "url": "https://access.redhat.com/security/cve/CVE-2024-43168", - "source": "secalert@redhat.com" + "source": "sep@nlnetlabs.nl" }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2303462", - "source": "secalert@redhat.com" + "source": "sep@nlnetlabs.nl" }, { "url": "https://github.com/NLnetLabs/unbound/issues/1039", - "source": "secalert@redhat.com" + "source": "sep@nlnetlabs.nl" }, { "url": "https://github.com/NLnetLabs/unbound/pull/1040/files", - "source": "secalert@redhat.com" + "source": "sep@nlnetlabs.nl" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-450xx/CVE-2024-45071.json b/CVE-2024/CVE-2024-450xx/CVE-2024-45071.json index bdc04904746..4690f7c46e8 100644 --- a/CVE-2024/CVE-2024-450xx/CVE-2024-45071.json +++ b/CVE-2024/CVE-2024-450xx/CVE-2024-45071.json @@ -2,8 +2,8 @@ "id": "CVE-2024-45071", "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-10-16T17:15:16.487", - "lastModified": "2024-10-18T12:53:04.627", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-21T13:41:29.383", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -18,8 +18,28 @@ "metrics": { "cvssMetricV31": [ { - "source": "psirt@us.ibm.com", + "source": "nvd@nist.gov", "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + }, + { + "source": "psirt@us.ibm.com", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N", @@ -51,10 +71,81 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:websphere_application_server:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.5.0.0", + "versionEndIncluding": "8.5.5.26", + "matchCriteriaId": "7953E024-F84E-4277-BA52-93F5B1091E23" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:websphere_application_server:*:*:*:*:*:*:*:*", + "versionStartIncluding": "9.0.0.0", + "versionEndIncluding": "9.0.5.21", + "matchCriteriaId": "185CEF83-9BF7-4567-B2EC-CCF59F567AF3" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:hp:hp-ux:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F480AA32-841A-4E68-9343-B2E7548B0A0C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:ibm:aix:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E492C463-D76E-49B7-A4D4-3B499E422D89" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:ibm:i:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C684FC45-C9BA-4EF0-BD06-BB289450DD21" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:ibm:z\\/os:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0E97A964-6F9E-4C87-9B90-21AE2C1DF52F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", + "matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:oracle:solaris:-:*:*:*:*:*:*:*", + "matchCriteriaId": "91F372EA-3A78-4703-A457-751B2C98D796" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.ibm.com/support/pages/node/7173270", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-450xx/CVE-2024-45072.json b/CVE-2024/CVE-2024-450xx/CVE-2024-45072.json index ada091d5daf..a9d166e0f4a 100644 --- a/CVE-2024/CVE-2024-450xx/CVE-2024-45072.json +++ b/CVE-2024/CVE-2024-450xx/CVE-2024-45072.json @@ -2,8 +2,8 @@ "id": "CVE-2024-45072", "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-10-16T17:15:16.750", - "lastModified": "2024-10-18T12:53:04.627", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-21T13:41:20.463", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,81 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:websphere_application_server:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.5.0.0", + "versionEndIncluding": "8.5.5.26", + "matchCriteriaId": "7953E024-F84E-4277-BA52-93F5B1091E23" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:websphere_application_server:*:*:*:*:*:*:*:*", + "versionStartIncluding": "9.0.0.0", + "versionEndIncluding": "9.0.5.21", + "matchCriteriaId": "185CEF83-9BF7-4567-B2EC-CCF59F567AF3" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:hp:hp-ux:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F480AA32-841A-4E68-9343-B2E7548B0A0C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:ibm:aix:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E492C463-D76E-49B7-A4D4-3B499E422D89" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:ibm:i:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C684FC45-C9BA-4EF0-BD06-BB289450DD21" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:ibm:z\\/os:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0E97A964-6F9E-4C87-9B90-21AE2C1DF52F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", + "matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:oracle:solaris:-:*:*:*:*:*:*:*", + "matchCriteriaId": "91F372EA-3A78-4703-A457-751B2C98D796" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.ibm.com/support/pages/node/7173263", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-476xx/CVE-2024-47669.json b/CVE-2024/CVE-2024-476xx/CVE-2024-47669.json index 0f55ae4a5a0..6d18498f9a4 100644 --- a/CVE-2024/CVE-2024-476xx/CVE-2024-47669.json +++ b/CVE-2024/CVE-2024-476xx/CVE-2024-47669.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47669", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-09T15:15:15.590", - "lastModified": "2024-10-10T12:51:56.987", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-21T13:28:34.330", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,39 +15,197 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: nilfs2: fix state management in error path of log writing function Despu\u00e9s de aplicar el commit a694291a6211 (\"nilfs2: separate wait function from nilfs_segctor_write\"), la funci\u00f3n de escritura de registros nilfs_segctor_do_construct() pudo emitir solicitudes de E/S de forma continua incluso si los bloques de datos del usuario se divid\u00edan en varios registros en todos los segmentos, pero se introdujeron dos posibles fallos en su gesti\u00f3n de errores. En primer lugar, si nilfs_segctor_begin_construction() falla al crear el segundo registro o los siguientes, la funci\u00f3n de escritura de registros vuelve sin llamar a nilfs_segctor_abort_construction(), por lo que el indicador de escritura diferida establecido en p\u00e1ginas/folios permanecer\u00e1 sin borrar. Esto hace que las operaciones de cach\u00e9 de p\u00e1gina se cuelguen esperando el indicador de escritura diferida. Por ejemplo, truncate_inode_pages_final(), que se llama a trav\u00e9s de nilfs_evict_inode() cuando se expulsa un inodo de la memoria, se bloquear\u00e1. En segundo lugar, el indicador NILFS_I_COLLECTED establecido en inodos normales permanece sin borrar. Como resultado, si la siguiente escritura de registro implica la creaci\u00f3n de un punto de control, eso est\u00e1 bien, pero si se realiza una escritura de registro parcial que no lo hace, los inodos con NILFS_I_COLLECTED establecido se eliminan por error de la lista \"sc_dirty_files\", y sus bloques de datos y de \u00e1rbol b pueden no escribirse en el dispositivo, lo que corrompe la asignaci\u00f3n de bloques. Solucione estos problemas llamando uniformemente a nilfs_segctor_abort_construction() en caso de falla de cada paso en el bucle en nilfs_segctor_do_construct(), haciendo que limpie los registros y los usos de segmentos seg\u00fan el progreso y corrigiendo las condiciones para llamar a nilfs_redirty_inodes() para garantizar que se borre el indicador NILFS_I_COLLECTED." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.6.33", + "versionEndExcluding": "4.19.322", + "matchCriteriaId": "5972AD1D-80D1-4691-AF86-1C6C29C180E0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.20", + "versionEndExcluding": "5.4.284", + "matchCriteriaId": "6265A402-9C3C-438F-BFC5-4194B2568B85" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.226", + "matchCriteriaId": "864FC17C-501A-4823-A643-6F35D65D8A97" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.167", + "matchCriteriaId": "043405A4-25FE-45D4-A7BB-2A0C3B7D17C1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.110", + "matchCriteriaId": "6B1A95FC-7E7E-428B-BB59-F76640C652AE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.51", + "matchCriteriaId": "E4529134-BAC4-4776-840B-304009E181A0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.10.10", + "matchCriteriaId": "ACDEE48C-137A-4731-90D0-A675865E1BED" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*", + "matchCriteriaId": "8B3CE743-2126-47A3-8B7C-822B502CF119" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:*", + "matchCriteriaId": "4DEB27E7-30AA-45CC-8934-B89263EF3551" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc3:*:*:*:*:*:*", + "matchCriteriaId": "E0005AEF-856E-47EB-BFE4-90C46899394D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc4:*:*:*:*:*:*", + "matchCriteriaId": "39889A68-6D34-47A6-82FC-CD0BF23D6754" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc5:*:*:*:*:*:*", + "matchCriteriaId": "B8383ABF-1457-401F-9B61-EE50F4C61F4F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc6:*:*:*:*:*:*", + "matchCriteriaId": "B77A9280-37E6-49AD-B559-5B23A3B1DC3D" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/036441e8438b29111fa75008f0ce305fb4e83c0a", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/0a1a961bde4351dc047ffdeb2f1311ca16a700cc", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/30562eff4a6dd35c4b5be9699ef61ad9f5f20a06", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/3e349d7191f0688fc9808ef24fd4e4b4ef5ca876", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/40a2757de2c376ef8a08d9ee9c81e77f3c750adf", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/6576dd6695f2afca3f4954029ac4a64f82ba60ab", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/74866c16ea2183f52925fa5d76061a1fe7f7737b", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/efdde00d4a1ef10bb71e09ebc67823a3d3ad725b", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Mailing List", + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-476xx/CVE-2024-47675.json b/CVE-2024/CVE-2024-476xx/CVE-2024-47675.json new file mode 100644 index 00000000000..beb5a27dcec --- /dev/null +++ b/CVE-2024/CVE-2024-476xx/CVE-2024-47675.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2024-47675", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2024-10-21T12:15:04.600", + "lastModified": "2024-10-21T12:15:04.600", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Fix use-after-free in bpf_uprobe_multi_link_attach()\n\nIf bpf_link_prime() fails, bpf_uprobe_multi_link_attach() goes to the\nerror_free label and frees the array of bpf_uprobe's without calling\nbpf_uprobe_unregister().\n\nThis leaks bpf_uprobe->uprobe and worse, this frees bpf_uprobe->consumer\nwithout removing it from the uprobe->consumers list." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/5fe6e308abaea082c20fbf2aa5df8e14495622cf", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/790c630ab0e7d7aba6d186581d4627c09fce60f3", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/7c1d782e5afbf7c50ba74ecc4ddc18a05d63e5ee", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/cdf27834c3dd5d9abf7eb8e4ee87ee9e307eb25c", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-476xx/CVE-2024-47676.json b/CVE-2024/CVE-2024-476xx/CVE-2024-47676.json new file mode 100644 index 00000000000..fe232e90ee6 --- /dev/null +++ b/CVE-2024/CVE-2024-476xx/CVE-2024-47676.json @@ -0,0 +1,29 @@ +{ + "id": "CVE-2024-47676", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2024-10-21T12:15:04.687", + "lastModified": "2024-10-21T12:15:04.687", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm/hugetlb.c: fix UAF of vma in hugetlb fault pathway\n\nSyzbot reports a UAF in hugetlb_fault(). This happens because\nvmf_anon_prepare() could drop the per-VMA lock and allow the current VMA\nto be freed before hugetlb_vma_unlock_read() is called.\n\nWe can fix this by using a modified version of vmf_anon_prepare() that\ndoesn't release the VMA lock on failure, and then release it ourselves\nafter hugetlb_vma_unlock_read()." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/98b74bb4d7e96b4da5ef3126511febe55b76b807", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/d59ebc99dee0a2687a26df94b901eb8216dbf876", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/e897d184a8dd4a4e1f39c8c495598e4d9472776c", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-476xx/CVE-2024-47677.json b/CVE-2024/CVE-2024-476xx/CVE-2024-47677.json new file mode 100644 index 00000000000..5ae15cf77e0 --- /dev/null +++ b/CVE-2024/CVE-2024-476xx/CVE-2024-47677.json @@ -0,0 +1,29 @@ +{ + "id": "CVE-2024-47677", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2024-10-21T12:15:04.760", + "lastModified": "2024-10-21T12:15:04.760", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nexfat: resolve memory leak from exfat_create_upcase_table()\n\nIf exfat_load_upcase_table reaches end and returns -EINVAL,\nallocated memory doesn't get freed and while\nexfat_load_default_upcase_table allocates more memory, leading to a\nmemory leak.\n\nHere's link to syzkaller crash report illustrating this issue:\nhttps://syzkaller.appspot.com/text?tag=CrashReport&x=1406c201980000" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/331ed2c739ce656a67865f6b3ee0a478349d78cb", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/c290fe508eee36df1640c3cb35dc8f89e073c8a8", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/f9835aec49670c46ebe2973032caaa1043b3d4da", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-476xx/CVE-2024-47678.json b/CVE-2024/CVE-2024-476xx/CVE-2024-47678.json new file mode 100644 index 00000000000..b8e7d813f3e --- /dev/null +++ b/CVE-2024/CVE-2024-476xx/CVE-2024-47678.json @@ -0,0 +1,37 @@ +{ + "id": "CVE-2024-47678", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2024-10-21T12:15:04.837", + "lastModified": "2024-10-21T12:15:04.837", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nicmp: change the order of rate limits\n\nICMP messages are ratelimited :\n\nAfter the blamed commits, the two rate limiters are applied in this order:\n\n1) host wide ratelimit (icmp_global_allow())\n\n2) Per destination ratelimit (inetpeer based)\n\nIn order to avoid side-channels attacks, we need to apply\nthe per destination check first.\n\nThis patch makes the following change :\n\n1) icmp_global_allow() checks if the host wide limit is reached.\n But credits are not yet consumed. This is deferred to 3)\n\n2) The per destination limit is checked/updated.\n This might add a new node in inetpeer tree.\n\n3) icmp_global_consume() consumes tokens if prior operations succeeded.\n\nThis means that host wide ratelimit is still effective\nin keeping inetpeer tree small even under DDOS.\n\nAs a bonus, I removed icmp_global.lock as the fast path\ncan use a lock-free operation." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/483397b4ba280813e4a9c161a0a85172ddb43d19", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/662ec52260cc07b9ae53ecd3925183c29d34288b", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/8c2bd38b95f75f3d2a08c93e35303e26d480d24e", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/997ba8889611891f91e8ad83583466aeab6239a3", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/a7722921adb046e3836eb84372241f32584bdb07", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-476xx/CVE-2024-47679.json b/CVE-2024/CVE-2024-476xx/CVE-2024-47679.json new file mode 100644 index 00000000000..be2064ee445 --- /dev/null +++ b/CVE-2024/CVE-2024-476xx/CVE-2024-47679.json @@ -0,0 +1,45 @@ +{ + "id": "CVE-2024-47679", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2024-10-21T12:15:04.920", + "lastModified": "2024-10-21T12:15:04.920", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nvfs: fix race between evice_inodes() and find_inode()&iput()\n\nHi, all\n\nRecently I noticed a bug[1] in btrfs, after digged it into\nand I believe it'a race in vfs.\n\nLet's assume there's a inode (ie ino 261) with i_count 1 is\ncalled by iput(), and there's a concurrent thread calling\ngeneric_shutdown_super().\n\ncpu0: cpu1:\niput() // i_count is 1\n ->spin_lock(inode)\n ->dec i_count to 0\n ->iput_final() generic_shutdown_super()\n ->__inode_add_lru() ->evict_inodes()\n // cause some reason[2] ->if (atomic_read(inode->i_count)) continue;\n // return before // inode 261 passed the above check\n // list_lru_add_obj() // and then schedule out\n ->spin_unlock()\n// note here: the inode 261\n// was still at sb list and hash list,\n// and I_FREEING|I_WILL_FREE was not been set\n\nbtrfs_iget()\n // after some function calls\n ->find_inode()\n // found the above inode 261\n ->spin_lock(inode)\n // check I_FREEING|I_WILL_FREE\n // and passed\n ->__iget()\n ->spin_unlock(inode) // schedule back\n ->spin_lock(inode)\n // check (I_NEW|I_FREEING|I_WILL_FREE) flags,\n // passed and set I_FREEING\niput() ->spin_unlock(inode)\n ->spin_lock(inode)\t\t\t ->evict()\n // dec i_count to 0\n ->iput_final()\n ->spin_unlock()\n ->evict()\n\nNow, we have two threads simultaneously evicting\nthe same inode, which may trigger the BUG(inode->i_state & I_CLEAR)\nstatement both within clear_inode() and iput().\n\nTo fix the bug, recheck the inode->i_count after holding i_lock.\nBecause in the most scenarios, the first check is valid, and\nthe overhead of spin_lock() can be reduced.\n\nIf there is any misunderstanding, please let me know, thanks.\n\n[1]: https://lore.kernel.org/linux-btrfs/000000000000eabe1d0619c48986@google.com/\n[2]: The reason might be 1. SB_ACTIVE was removed or 2. mapping_shrinkable()\nreturn false when I reproduced the bug." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/0eed942bc65de1f93eca7bda51344290f9c573bb", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/0f8a5b6d0dafa4f533ac82e98f8b812073a7c9d1", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/3721a69403291e2514d13a7c3af50a006ea1153b", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/47a68c75052a660e4c37de41e321582ec9496195", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/540fb13120c9eab3ef203f90c00c8e69f37449d1", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/6c857fb12b9137fee574443385d53914356bbe11", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/88b1afbf0f6b221f6c5bb66cc80cd3b38d696687", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-476xx/CVE-2024-47680.json b/CVE-2024/CVE-2024-476xx/CVE-2024-47680.json new file mode 100644 index 00000000000..0aea1b01cb4 --- /dev/null +++ b/CVE-2024/CVE-2024-476xx/CVE-2024-47680.json @@ -0,0 +1,29 @@ +{ + "id": "CVE-2024-47680", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2024-10-21T12:15:05.003", + "lastModified": "2024-10-21T12:15:05.003", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nf2fs: check discard support for conventional zones\n\nAs the helper function f2fs_bdev_support_discard() shows, f2fs checks if\nthe target block devices support discard by calling\nbdev_max_discard_sectors() and bdev_is_zoned(). This check works well\nfor most cases, but it does not work for conventional zones on zoned\nblock devices. F2fs assumes that zoned block devices support discard,\nand calls __submit_discard_cmd(). When __submit_discard_cmd() is called\nfor sequential write required zones, it works fine since\n__submit_discard_cmd() issues zone reset commands instead of discard\ncommands. However, when __submit_discard_cmd() is called for\nconventional zones, __blkdev_issue_discard() is called even when the\ndevices do not support discard.\n\nThe inappropriate __blkdev_issue_discard() call was not a problem before\nthe commit 30f1e7241422 (\"block: move discard checks into the ioctl\nhandler\") because __blkdev_issue_discard() checked if the target devices\nsupport discard or not. If not, it returned EOPNOTSUPP. After the\ncommit, __blkdev_issue_discard() no longer checks it. It always returns\nzero and sets NULL to the given bio pointer. This NULL pointer triggers\nf2fs_bug_on() in __submit_discard_cmd(). The BUG is recreated with the\ncommands below at the umount step, where /dev/nullb0 is a zoned null_blk\nwith 5GB total size, 128MB zone size and 10 conventional zones.\n\n$ mkfs.f2fs -f -m /dev/nullb0\n$ mount /dev/nullb0 /mnt\n$ for ((i=0;i<5;i++)); do dd if=/dev/zero of=/mnt/test bs=65536 count=1600 conv=fsync; done\n$ umount /mnt\n\nTo fix the BUG, avoid the inappropriate __blkdev_issue_discard() call.\nWhen discard is requested for conventional zones, check if the device\nsupports discard or not. If not, return EOPNOTSUPP." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/43aec4d01bd2ce961817a777b3846f8318f398e4", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/7bd7ce68ddad5a28565e42ef21cacaff113773a9", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/d2352b57897f6a3349666fc318dcbec99092c6a5", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-476xx/CVE-2024-47681.json b/CVE-2024/CVE-2024-476xx/CVE-2024-47681.json new file mode 100644 index 00000000000..ecc0e640c52 --- /dev/null +++ b/CVE-2024/CVE-2024-476xx/CVE-2024-47681.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2024-47681", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2024-10-21T12:15:05.080", + "lastModified": "2024-10-21T12:15:05.080", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: mt76: mt7996: fix NULL pointer dereference in mt7996_mcu_sta_bfer_he\n\nFix the NULL pointer dereference in mt7996_mcu_sta_bfer_he\nroutine adding an sta interface to the mt7996 driver.\n\nFound by code review." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/174c803b432596cdd7dd3ec5e0ec52b561969ee2", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/1afdde3b5f56217d875a543cf565075c11bbddad", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/8e4b60ae8a047ad2fb175fcfdd54feee80983a45", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/f503ae90c7355e8506e68498fe84c1357894cd5b", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-476xx/CVE-2024-47682.json b/CVE-2024/CVE-2024-476xx/CVE-2024-47682.json new file mode 100644 index 00000000000..a8ad4707dec --- /dev/null +++ b/CVE-2024/CVE-2024-476xx/CVE-2024-47682.json @@ -0,0 +1,37 @@ +{ + "id": "CVE-2024-47682", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2024-10-21T12:15:05.143", + "lastModified": "2024-10-21T12:15:05.143", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: sd: Fix off-by-one error in sd_read_block_characteristics()\n\nFf the device returns page 0xb1 with length 8 (happens with qemu v2.x, for\nexample), sd_read_block_characteristics() may attempt an out-of-bounds\nmemory access when accessing the zoned field at offset 8." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/413df704f149dec585df07466d2401bbd1f490a0", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/568c7c4c77eee6df7677bb861b7cee7398a3255d", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/60312ae7392f9c75c6591a52fc359cf7f810d48f", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/a776050373893e4c847a49abeae2ccb581153df0", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/f81eaf08385ddd474a2f41595a7757502870c0eb", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-476xx/CVE-2024-47683.json b/CVE-2024/CVE-2024-476xx/CVE-2024-47683.json new file mode 100644 index 00000000000..ccff2911814 --- /dev/null +++ b/CVE-2024/CVE-2024-476xx/CVE-2024-47683.json @@ -0,0 +1,49 @@ +{ + "id": "CVE-2024-47683", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2024-10-21T12:15:05.210", + "lastModified": "2024-10-21T12:15:05.210", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: Skip Recompute DSC Params if no Stream on Link\n\n[why]\nEncounter NULL pointer dereference uner mst + dsc setup.\n\nBUG: kernel NULL pointer dereference, address: 0000000000000008\n PGD 0 P4D 0\n Oops: 0000 [#1] PREEMPT SMP NOPTI\n CPU: 4 PID: 917 Comm: sway Not tainted 6.3.9-arch1-1 #1 124dc55df4f5272ccb409f39ef4872fc2b3376a2\n Hardware name: LENOVO 20NKS01Y00/20NKS01Y00, BIOS R12ET61W(1.31 ) 07/28/2022\n RIP: 0010:drm_dp_atomic_find_time_slots+0x5e/0x260 [drm_display_helper]\n Code: 01 00 00 48 8b 85 60 05 00 00 48 63 80 88 00 00 00 3b 43 28 0f 8d 2e 01 00 00 48 8b 53 30 48 8d 04 80 48 8d 04 c2 48 8b 40 18 <48> 8>\n RSP: 0018:ffff960cc2df77d8 EFLAGS: 00010293\n RAX: 0000000000000000 RBX: ffff8afb87e81280 RCX: 0000000000000224\n RDX: ffff8afb9ee37c00 RSI: ffff8afb8da1a578 RDI: ffff8afb87e81280\n RBP: ffff8afb83d67000 R08: 0000000000000001 R09: ffff8afb9652f850\n R10: ffff960cc2df7908 R11: 0000000000000002 R12: 0000000000000000\n R13: ffff8afb8d7688a0 R14: ffff8afb8da1a578 R15: 0000000000000224\n FS: 00007f4dac35ce00(0000) GS:ffff8afe30b00000(0000) knlGS:0000000000000000\n CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n CR2: 0000000000000008 CR3: 000000010ddc6000 CR4: 00000000003506e0\n Call Trace:\n\n ? __die+0x23/0x70\n ? page_fault_oops+0x171/0x4e0\n ? plist_add+0xbe/0x100\n ? exc_page_fault+0x7c/0x180\n ? asm_exc_page_fault+0x26/0x30\n ? drm_dp_atomic_find_time_slots+0x5e/0x260 [drm_display_helper 0e67723696438d8e02b741593dd50d80b44c2026]\n ? drm_dp_atomic_find_time_slots+0x28/0x260 [drm_display_helper 0e67723696438d8e02b741593dd50d80b44c2026]\n compute_mst_dsc_configs_for_link+0x2ff/0xa40 [amdgpu 62e600d2a75e9158e1cd0a243bdc8e6da040c054]\n ? fill_plane_buffer_attributes+0x419/0x510 [amdgpu 62e600d2a75e9158e1cd0a243bdc8e6da040c054]\n compute_mst_dsc_configs_for_state+0x1e1/0x250 [amdgpu 62e600d2a75e9158e1cd0a243bdc8e6da040c054]\n amdgpu_dm_atomic_check+0xecd/0x1190 [amdgpu 62e600d2a75e9158e1cd0a243bdc8e6da040c054]\n drm_atomic_check_only+0x5c5/0xa40\n drm_mode_atomic_ioctl+0x76e/0xbc0\n\n[how]\ndsc recompute should be skipped if no mode change detected on the new\nrequest. If detected, keep checking whether the stream is already on\ncurrent state or not." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/282f0a482ee61d5e863512f3c4fcec90216c20d9", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/6f9c39e8169384d2a5ca9bf323a0c1b81b3d0f3a", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/70275bb960c71d313254473d38c14e7101cee5ad", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/718d83f66fb07b2cab89a1fc984613a00e3db18f", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/7c887efda1201110211fed8921a92a713e0b6bcd", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/8151a6c13111b465dbabe07c19f572f7cbd16fef", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/a53841b074cc196c3caaa37e1f15d6bc90943b97", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/d45c64d933586d409d3f1e0ecaca4da494b1d9c6", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-476xx/CVE-2024-47684.json b/CVE-2024/CVE-2024-476xx/CVE-2024-47684.json new file mode 100644 index 00000000000..50a01f13c52 --- /dev/null +++ b/CVE-2024/CVE-2024-476xx/CVE-2024-47684.json @@ -0,0 +1,45 @@ +{ + "id": "CVE-2024-47684", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2024-10-21T12:15:05.290", + "lastModified": "2024-10-21T12:15:05.290", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ntcp: check skb is non-NULL in tcp_rto_delta_us()\n\nWe have some machines running stock Ubuntu 20.04.6 which is their 5.4.0-174-generic\nkernel that are running ceph and recently hit a null ptr dereference in\ntcp_rearm_rto(). Initially hitting it from the TLP path, but then later we also\nsaw it getting hit from the RACK case as well. Here are examples of the oops\nmessages we saw in each of those cases:\n\nJul 26 15:05:02 rx [11061395.780353] BUG: kernel NULL pointer dereference, address: 0000000000000020\nJul 26 15:05:02 rx [11061395.787572] #PF: supervisor read access in kernel mode\nJul 26 15:05:02 rx [11061395.792971] #PF: error_code(0x0000) - not-present page\nJul 26 15:05:02 rx [11061395.798362] PGD 0 P4D 0\nJul 26 15:05:02 rx [11061395.801164] Oops: 0000 [#1] SMP NOPTI\nJul 26 15:05:02 rx [11061395.805091] CPU: 0 PID: 9180 Comm: msgr-worker-1 Tainted: G W 5.4.0-174-generic #193-Ubuntu\nJul 26 15:05:02 rx [11061395.814996] Hardware name: Supermicro SMC 2x26 os-gen8 64C NVME-Y 256G/H12SSW-NTR, BIOS 2.5.V1.2U.NVMe.UEFI 05/09/2023\nJul 26 15:05:02 rx [11061395.825952] RIP: 0010:tcp_rearm_rto+0xe4/0x160\nJul 26 15:05:02 rx [11061395.830656] Code: 87 ca 04 00 00 00 5b 41 5c 41 5d 5d c3 c3 49 8b bc 24 40 06 00 00 eb 8d 48 bb cf f7 53 e3 a5 9b c4 20 4c 89 ef e8 0c fe 0e 00 <48> 8b 78 20 48 c1 ef 03 48 89 f8 41 8b bc 24 80 04 00 00 48 f7 e3\nJul 26 15:05:02 rx [11061395.849665] RSP: 0018:ffffb75d40003e08 EFLAGS: 00010246\nJul 26 15:05:02 rx [11061395.855149] RAX: 0000000000000000 RBX: 20c49ba5e353f7cf RCX: 0000000000000000\nJul 26 15:05:02 rx [11061395.862542] RDX: 0000000062177c30 RSI: 000000000000231c RDI: ffff9874ad283a60\nJul 26 15:05:02 rx [11061395.869933] RBP: ffffb75d40003e20 R08: 0000000000000000 R09: ffff987605e20aa8\nJul 26 15:05:02 rx [11061395.877318] R10: ffffb75d40003f00 R11: ffffb75d4460f740 R12: ffff9874ad283900\nJul 26 15:05:02 rx [11061395.884710] R13: ffff9874ad283a60 R14: ffff9874ad283980 R15: ffff9874ad283d30\nJul 26 15:05:02 rx [11061395.892095] FS: 00007f1ef4a2e700(0000) GS:ffff987605e00000(0000) knlGS:0000000000000000\nJul 26 15:05:02 rx [11061395.900438] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nJul 26 15:05:02 rx [11061395.906435] CR2: 0000000000000020 CR3: 0000003e450ba003 CR4: 0000000000760ef0\nJul 26 15:05:02 rx [11061395.913822] PKRU: 55555554\nJul 26 15:05:02 rx [11061395.916786] Call Trace:\nJul 26 15:05:02 rx [11061395.919488]\nJul 26 15:05:02 rx [11061395.921765] ? show_regs.cold+0x1a/0x1f\nJul 26 15:05:02 rx [11061395.925859] ? __die+0x90/0xd9\nJul 26 15:05:02 rx [11061395.929169] ? no_context+0x196/0x380\nJul 26 15:05:02 rx [11061395.933088] ? ip6_protocol_deliver_rcu+0x4e0/0x4e0\nJul 26 15:05:02 rx [11061395.938216] ? ip6_sublist_rcv_finish+0x3d/0x50\nJul 26 15:05:02 rx [11061395.943000] ? __bad_area_nosemaphore+0x50/0x1a0\nJul 26 15:05:02 rx [11061395.947873] ? bad_area_nosemaphore+0x16/0x20\nJul 26 15:05:02 rx [11061395.952486] ? do_user_addr_fault+0x267/0x450\nJul 26 15:05:02 rx [11061395.957104] ? ipv6_list_rcv+0x112/0x140\nJul 26 15:05:02 rx [11061395.961279] ? __do_page_fault+0x58/0x90\nJul 26 15:05:02 rx [11061395.965458] ? do_page_fault+0x2c/0xe0\nJul 26 15:05:02 rx [11061395.969465] ? page_fault+0x34/0x40\nJul 26 15:05:02 rx [11061395.973217] ? tcp_rearm_rto+0xe4/0x160\nJul 26 15:05:02 rx [11061395.977313] ? tcp_rearm_rto+0xe4/0x160\nJul 26 15:05:02 rx [11061395.981408] tcp_send_loss_probe+0x10b/0x220\nJul 26 15:05:02 rx [11061395.985937] tcp_write_timer_handler+0x1b4/0x240\nJul 26 15:05:02 rx [11061395.990809] tcp_write_timer+0x9e/0xe0\nJul 26 15:05:02 rx [11061395.994814] ? tcp_write_timer_handler+0x240/0x240\nJul 26 15:05:02 rx [11061395.999866] call_timer_fn+0x32/0x130\nJul 26 15:05:02 rx [11061396.003782] __run_timers.part.0+0x180/0x280\nJul 26 15:05:02 rx [11061396.008309] ? recalibrate_cpu_khz+0x10/0x10\nJul 26 15:05:02 rx [11061396.012841] ? native_x2apic_icr_write+0x30/0x30\nJul 26 15:05:02 rx [11061396.017718] ? lapic_next_even\n---truncated---" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/09aea49fbc7e755a915c405644f347137cdb62b0", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/570f7d8c9bf14f041152ba8353d4330ef7575915", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/5c4c03288a4aea705e36aa44119c13d7ee4dce99", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/81d18c152e3f82bacadf83bc0a471b2363b9cc18", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/96c4983eab2a5da235f7fff90beaf17b008ba029", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/c8770db2d54437a5f49417ae7b46f7de23d14db6", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/ec31cf42fc4e35bb1248ce6eb1de6de9f851ac86", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-476xx/CVE-2024-47685.json b/CVE-2024/CVE-2024-476xx/CVE-2024-47685.json new file mode 100644 index 00000000000..6d1986b2b6c --- /dev/null +++ b/CVE-2024/CVE-2024-476xx/CVE-2024-47685.json @@ -0,0 +1,45 @@ +{ + "id": "CVE-2024-47685", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2024-10-21T12:15:05.397", + "lastModified": "2024-10-21T12:15:05.397", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nf_reject_ipv6: fix nf_reject_ip6_tcphdr_put()\n\nsyzbot reported that nf_reject_ip6_tcphdr_put() was possibly sending\ngarbage on the four reserved tcp bits (th->res1)\n\nUse skb_put_zero() to clear the whole TCP header,\nas done in nf_reject_ip_tcphdr_put()\n\nBUG: KMSAN: uninit-value in nf_reject_ip6_tcphdr_put+0x688/0x6c0 net/ipv6/netfilter/nf_reject_ipv6.c:255\n nf_reject_ip6_tcphdr_put+0x688/0x6c0 net/ipv6/netfilter/nf_reject_ipv6.c:255\n nf_send_reset6+0xd84/0x15b0 net/ipv6/netfilter/nf_reject_ipv6.c:344\n nft_reject_inet_eval+0x3c1/0x880 net/netfilter/nft_reject_inet.c:48\n expr_call_ops_eval net/netfilter/nf_tables_core.c:240 [inline]\n nft_do_chain+0x438/0x22a0 net/netfilter/nf_tables_core.c:288\n nft_do_chain_inet+0x41a/0x4f0 net/netfilter/nft_chain_filter.c:161\n nf_hook_entry_hookfn include/linux/netfilter.h:154 [inline]\n nf_hook_slow+0xf4/0x400 net/netfilter/core.c:626\n nf_hook include/linux/netfilter.h:269 [inline]\n NF_HOOK include/linux/netfilter.h:312 [inline]\n ipv6_rcv+0x29b/0x390 net/ipv6/ip6_input.c:310\n __netif_receive_skb_one_core net/core/dev.c:5661 [inline]\n __netif_receive_skb+0x1da/0xa00 net/core/dev.c:5775\n process_backlog+0x4ad/0xa50 net/core/dev.c:6108\n __napi_poll+0xe7/0x980 net/core/dev.c:6772\n napi_poll net/core/dev.c:6841 [inline]\n net_rx_action+0xa5a/0x19b0 net/core/dev.c:6963\n handle_softirqs+0x1ce/0x800 kernel/softirq.c:554\n __do_softirq+0x14/0x1a kernel/softirq.c:588\n do_softirq+0x9a/0x100 kernel/softirq.c:455\n __local_bh_enable_ip+0x9f/0xb0 kernel/softirq.c:382\n local_bh_enable include/linux/bottom_half.h:33 [inline]\n rcu_read_unlock_bh include/linux/rcupdate.h:908 [inline]\n __dev_queue_xmit+0x2692/0x5610 net/core/dev.c:4450\n dev_queue_xmit include/linux/netdevice.h:3105 [inline]\n neigh_resolve_output+0x9ca/0xae0 net/core/neighbour.c:1565\n neigh_output include/net/neighbour.h:542 [inline]\n ip6_finish_output2+0x2347/0x2ba0 net/ipv6/ip6_output.c:141\n __ip6_finish_output net/ipv6/ip6_output.c:215 [inline]\n ip6_finish_output+0xbb8/0x14b0 net/ipv6/ip6_output.c:226\n NF_HOOK_COND include/linux/netfilter.h:303 [inline]\n ip6_output+0x356/0x620 net/ipv6/ip6_output.c:247\n dst_output include/net/dst.h:450 [inline]\n NF_HOOK include/linux/netfilter.h:314 [inline]\n ip6_xmit+0x1ba6/0x25d0 net/ipv6/ip6_output.c:366\n inet6_csk_xmit+0x442/0x530 net/ipv6/inet6_connection_sock.c:135\n __tcp_transmit_skb+0x3b07/0x4880 net/ipv4/tcp_output.c:1466\n tcp_transmit_skb net/ipv4/tcp_output.c:1484 [inline]\n tcp_connect+0x35b6/0x7130 net/ipv4/tcp_output.c:4143\n tcp_v6_connect+0x1bcc/0x1e40 net/ipv6/tcp_ipv6.c:333\n __inet_stream_connect+0x2ef/0x1730 net/ipv4/af_inet.c:679\n inet_stream_connect+0x6a/0xd0 net/ipv4/af_inet.c:750\n __sys_connect_file net/socket.c:2061 [inline]\n __sys_connect+0x606/0x690 net/socket.c:2078\n __do_sys_connect net/socket.c:2088 [inline]\n __se_sys_connect net/socket.c:2085 [inline]\n __x64_sys_connect+0x91/0xe0 net/socket.c:2085\n x64_sys_call+0x27a5/0x3ba0 arch/x86/include/generated/asm/syscalls_64.h:43\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n do_syscall_64+0xcd/0x1e0 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n\nUninit was stored to memory at:\n nf_reject_ip6_tcphdr_put+0x60c/0x6c0 net/ipv6/netfilter/nf_reject_ipv6.c:249\n nf_send_reset6+0xd84/0x15b0 net/ipv6/netfilter/nf_reject_ipv6.c:344\n nft_reject_inet_eval+0x3c1/0x880 net/netfilter/nft_reject_inet.c:48\n expr_call_ops_eval net/netfilter/nf_tables_core.c:240 [inline]\n nft_do_chain+0x438/0x22a0 net/netfilter/nf_tables_core.c:288\n nft_do_chain_inet+0x41a/0x4f0 net/netfilter/nft_chain_filter.c:161\n nf_hook_entry_hookfn include/linux/netfilter.h:154 [inline]\n nf_hook_slow+0xf4/0x400 net/netfilter/core.c:626\n nf_hook include/linux/netfilter.h:269 [inline]\n NF_HOOK include/linux/netfilter.h:312 [inline]\n ipv6_rcv+0x29b/0x390 net/ipv6/ip6_input.c:310\n __netif_receive_skb_one_core\n---truncated---" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/10210658f827ad45061581cbfc05924b723e8922", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/7a7b5a27c53b55e91eecf646d1b204e73fa4af93", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/7ea2bcfd9bf4c3dbbf22546162226fd1c14d8ad2", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/9c778fe48d20ef362047e3376dee56d77f8500d4", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/af4b8a704f26f38310655bad67fd8096293275a2", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/dcf48ab3ca2c55b09c8f9c8de0df01c1943bc4e5", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/fbff87d682e57ddbbe82abf6d0a1a4a36a98afcd", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-476xx/CVE-2024-47686.json b/CVE-2024/CVE-2024-476xx/CVE-2024-47686.json new file mode 100644 index 00000000000..76db0f72c8e --- /dev/null +++ b/CVE-2024/CVE-2024-476xx/CVE-2024-47686.json @@ -0,0 +1,37 @@ +{ + "id": "CVE-2024-47686", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2024-10-21T12:15:05.497", + "lastModified": "2024-10-21T12:15:05.497", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nep93xx: clock: Fix off by one in ep93xx_div_recalc_rate()\n\nThe psc->div[] array has psc->num_div elements. These values come from\nwhen we call clk_hw_register_div(). It's adc_divisors and\nARRAY_SIZE(adc_divisors)) and so on. So this condition needs to be >=\ninstead of > to prevent an out of bounds read." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/27f493e141823db052586010c1532b70b164507c", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/66e78ade976dbd9bea09166aa8d66afc0963cde4", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/7a5bd2fb92388c51d267f6ce57c40f1cca8af1e0", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/ae59eaf36a1ad396e9f657ec9b8b52da6206ed5f", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/c7f06284a6427475e3df742215535ec3f6cd9662", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-476xx/CVE-2024-47687.json b/CVE-2024/CVE-2024-476xx/CVE-2024-47687.json new file mode 100644 index 00000000000..bf3b25c5fd3 --- /dev/null +++ b/CVE-2024/CVE-2024-476xx/CVE-2024-47687.json @@ -0,0 +1,29 @@ +{ + "id": "CVE-2024-47687", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2024-10-21T12:15:05.580", + "lastModified": "2024-10-21T12:15:05.580", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nvdpa/mlx5: Fix invalid mr resource destroy\n\nCertain error paths from mlx5_vdpa_dev_add() can end up releasing mr\nresources which never got initialized in the first place.\n\nThis patch adds the missing check in mlx5_vdpa_destroy_mr_resources()\nto block releasing non-initialized mr resources.\n\nReference trace:\n\n mlx5_core 0000:08:00.2: mlx5_vdpa_dev_add:3274:(pid 2700) warning: No mac address provisioned?\n BUG: kernel NULL pointer dereference, address: 0000000000000000\n #PF: supervisor read access in kernel mode\n #PF: error_code(0x0000) - not-present page\n PGD 140216067 P4D 0\n Oops: 0000 [#1] PREEMPT SMP NOPTI\n CPU: 8 PID: 2700 Comm: vdpa Kdump: loaded Not tainted 5.14.0-496.el9.x86_64 #1\n Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014\n RIP: 0010:vhost_iotlb_del_range+0xf/0xe0 [vhost_iotlb]\n Code: [...]\n RSP: 0018:ff1c823ac23077f0 EFLAGS: 00010246\n RAX: ffffffffc1a21a60 RBX: ffffffff899567a0 RCX: 0000000000000000\n RDX: ffffffffffffffff RSI: 0000000000000000 RDI: 0000000000000000\n RBP: ff1bda1f7c21e800 R08: 0000000000000000 R09: ff1c823ac2307670\n R10: ff1c823ac2307668 R11: ffffffff8a9e7b68 R12: 0000000000000000\n R13: 0000000000000000 R14: ff1bda1f43e341a0 R15: 00000000ffffffea\n FS: 00007f56eba7c740(0000) GS:ff1bda269f800000(0000) knlGS:0000000000000000\n CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n CR2: 0000000000000000 CR3: 0000000104d90001 CR4: 0000000000771ef0\n DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n PKRU: 55555554\n Call Trace:\n\n ? show_trace_log_lvl+0x1c4/0x2df\n ? show_trace_log_lvl+0x1c4/0x2df\n ? mlx5_vdpa_free+0x3d/0x150 [mlx5_vdpa]\n ? __die_body.cold+0x8/0xd\n ? page_fault_oops+0x134/0x170\n ? __irq_work_queue_local+0x2b/0xc0\n ? irq_work_queue+0x2c/0x50\n ? exc_page_fault+0x62/0x150\n ? asm_exc_page_fault+0x22/0x30\n ? __pfx_mlx5_vdpa_free+0x10/0x10 [mlx5_vdpa]\n ? vhost_iotlb_del_range+0xf/0xe0 [vhost_iotlb]\n mlx5_vdpa_free+0x3d/0x150 [mlx5_vdpa]\n vdpa_release_dev+0x1e/0x50 [vdpa]\n device_release+0x31/0x90\n kobject_cleanup+0x37/0x130\n mlx5_vdpa_dev_add+0x2d2/0x7a0 [mlx5_vdpa]\n vdpa_nl_cmd_dev_add_set_doit+0x277/0x4c0 [vdpa]\n genl_family_rcv_msg_doit+0xd9/0x130\n genl_family_rcv_msg+0x14d/0x220\n ? __pfx_vdpa_nl_cmd_dev_add_set_doit+0x10/0x10 [vdpa]\n ? _copy_to_user+0x1a/0x30\n ? move_addr_to_user+0x4b/0xe0\n genl_rcv_msg+0x47/0xa0\n ? __import_iovec+0x46/0x150\n ? __pfx_genl_rcv_msg+0x10/0x10\n netlink_rcv_skb+0x54/0x100\n genl_rcv+0x24/0x40\n netlink_unicast+0x245/0x370\n netlink_sendmsg+0x206/0x440\n __sys_sendto+0x1dc/0x1f0\n ? do_read_fault+0x10c/0x1d0\n ? do_pte_missing+0x10d/0x190\n __x64_sys_sendto+0x20/0x30\n do_syscall_64+0x5c/0xf0\n ? __count_memcg_events+0x4f/0xb0\n ? mm_account_fault+0x6c/0x100\n ? handle_mm_fault+0x116/0x270\n ? do_user_addr_fault+0x1d6/0x6a0\n ? do_syscall_64+0x6b/0xf0\n ? clear_bhb_loop+0x25/0x80\n ? clear_bhb_loop+0x25/0x80\n ? clear_bhb_loop+0x25/0x80\n ? clear_bhb_loop+0x25/0x80\n ? clear_bhb_loop+0x25/0x80\n entry_SYSCALL_64_after_hwframe+0x78/0x80" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/5fe351def237df1ad29aa8af574350bc5340b4cf", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/b6fbb1c7801f46a0e5461c02904eab0d7535c790", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/dc12502905b7a3de9097ea6b98870470c2921e09", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-476xx/CVE-2024-47688.json b/CVE-2024/CVE-2024-476xx/CVE-2024-47688.json new file mode 100644 index 00000000000..cbfb9661b71 --- /dev/null +++ b/CVE-2024/CVE-2024-476xx/CVE-2024-47688.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2024-47688", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2024-10-21T12:15:05.653", + "lastModified": "2024-10-21T12:15:05.653", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndriver core: Fix a potential null-ptr-deref in module_add_driver()\n\nInject fault while probing of-fpga-region, if kasprintf() fails in\nmodule_add_driver(), the second sysfs_remove_link() in exit path will cause\nnull-ptr-deref as below because kernfs_name_hash() will call strlen() with\nNULL driver_name.\n\nFix it by releasing resources based on the exit path sequence.\n\n\t KASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007]\n\t Mem abort info:\n\t ESR = 0x0000000096000005\n\t EC = 0x25: DABT (current EL), IL = 32 bits\n\t SET = 0, FnV = 0\n\t EA = 0, S1PTW = 0\n\t FSC = 0x05: level 1 translation fault\n\t Data abort info:\n\t ISV = 0, ISS = 0x00000005, ISS2 = 0x00000000\n\t CM = 0, WnR = 0, TnD = 0, TagAccess = 0\n\t GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0\n\t [dfffffc000000000] address between user and kernel address ranges\n\t Internal error: Oops: 0000000096000005 [#1] PREEMPT SMP\n\t Dumping ftrace buffer:\n\t (ftrace buffer empty)\n\t Modules linked in: of_fpga_region(+) fpga_region fpga_bridge cfg80211 rfkill 8021q garp mrp stp llc ipv6 [last unloaded: of_fpga_region]\n\t CPU: 2 UID: 0 PID: 2036 Comm: modprobe Not tainted 6.11.0-rc2-g6a0e38264012 #295\n\t Hardware name: linux,dummy-virt (DT)\n\t pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n\t pc : strlen+0x24/0xb0\n\t lr : kernfs_name_hash+0x1c/0xc4\n\t sp : ffffffc081f97380\n\t x29: ffffffc081f97380 x28: ffffffc081f97b90 x27: ffffff80c821c2a0\n\t x26: ffffffedac0be418 x25: 0000000000000000 x24: ffffff80c09d2000\n\t x23: 0000000000000000 x22: 0000000000000000 x21: 0000000000000000\n\t x20: 0000000000000000 x19: 0000000000000000 x18: 0000000000001840\n\t x17: 0000000000000000 x16: 0000000000000000 x15: 1ffffff8103f2e42\n\t x14: 00000000f1f1f1f1 x13: 0000000000000004 x12: ffffffb01812d61d\n\t x11: 1ffffff01812d61c x10: ffffffb01812d61c x9 : dfffffc000000000\n\t x8 : 0000004fe7ed29e4 x7 : ffffff80c096b0e7 x6 : 0000000000000001\n\t x5 : ffffff80c096b0e0 x4 : 1ffffffdb990efa2 x3 : 0000000000000000\n\t x2 : 0000000000000000 x1 : dfffffc000000000 x0 : 0000000000000000\n\t Call trace:\n\t strlen+0x24/0xb0\n\t kernfs_name_hash+0x1c/0xc4\n\t kernfs_find_ns+0x118/0x2e8\n\t kernfs_remove_by_name_ns+0x80/0x100\n\t sysfs_remove_link+0x74/0xa8\n\t module_add_driver+0x278/0x394\n\t bus_add_driver+0x1f0/0x43c\n\t driver_register+0xf4/0x3c0\n\t __platform_driver_register+0x60/0x88\n\t of_fpga_region_init+0x20/0x1000 [of_fpga_region]\n\t do_one_initcall+0x110/0x788\n\t do_init_module+0x1dc/0x5c8\n\t load_module+0x3c38/0x4cac\n\t init_module_from_file+0xd4/0x128\n\t idempotent_init_module+0x2cc/0x528\n\t __arm64_sys_finit_module+0xac/0x100\n\t invoke_syscall+0x6c/0x258\n\t el0_svc_common.constprop.0+0x160/0x22c\n\t do_el0_svc+0x44/0x5c\n\t el0_svc+0x48/0xb8\n\t el0t_64_sync_handler+0x13c/0x158\n\t el0t_64_sync+0x190/0x194\n\t Code: f2fbffe1 a90157f4 12000802 aa0003f5 (38e16861)\n\t ---[ end trace 0000000000000000 ]---\n\t Kernel panic - not syncing: Oops: Fatal exception" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/18ec12c97b39ff6aa15beb8d2b25d15cd44b87d8", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/4b5d48b7a29cc6d508121a4b4e0c97a891e5273c", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/b8e45b910525704010d10c9dcbf2abf3005aa97c", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/dcb9d581dee4c23f2378b6650511ece80dda4e2f", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-476xx/CVE-2024-47689.json b/CVE-2024/CVE-2024-476xx/CVE-2024-47689.json new file mode 100644 index 00000000000..ede3a3bbd2a --- /dev/null +++ b/CVE-2024/CVE-2024-476xx/CVE-2024-47689.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2024-47689", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2024-10-21T12:15:05.733", + "lastModified": "2024-10-21T12:15:05.733", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nf2fs: fix to don't set SB_RDONLY in f2fs_handle_critical_error()\n\nsyzbot reports a f2fs bug as below:\n\n------------[ cut here ]------------\nWARNING: CPU: 1 PID: 58 at kernel/rcu/sync.c:177 rcu_sync_dtor+0xcd/0x180 kernel/rcu/sync.c:177\nCPU: 1 UID: 0 PID: 58 Comm: kworker/1:2 Not tainted 6.10.0-syzkaller-12562-g1722389b0d86 #0\nWorkqueue: events destroy_super_work\nRIP: 0010:rcu_sync_dtor+0xcd/0x180 kernel/rcu/sync.c:177\nCall Trace:\n percpu_free_rwsem+0x41/0x80 kernel/locking/percpu-rwsem.c:42\n destroy_super_work+0xec/0x130 fs/super.c:282\n process_one_work kernel/workqueue.c:3231 [inline]\n process_scheduled_works+0xa2c/0x1830 kernel/workqueue.c:3312\n worker_thread+0x86d/0xd40 kernel/workqueue.c:3390\n kthread+0x2f0/0x390 kernel/kthread.c:389\n ret_from_fork+0x4b/0x80 arch/x86/kernel/process.c:147\n ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244\n\nAs Christian Brauner pointed out [1]: the root cause is f2fs sets\nSB_RDONLY flag in internal function, rather than setting the flag\ncovered w/ sb->s_umount semaphore via remount procedure, then below\nrace condition causes this bug:\n\n- freeze_super()\n - sb_wait_write(sb, SB_FREEZE_WRITE)\n - sb_wait_write(sb, SB_FREEZE_PAGEFAULT)\n - sb_wait_write(sb, SB_FREEZE_FS)\n\t\t\t\t\t- f2fs_handle_critical_error\n\t\t\t\t\t - sb->s_flags |= SB_RDONLY\n- thaw_super\n - thaw_super_locked\n - sb_rdonly() is true, so it skips\n sb_freeze_unlock(sb, SB_FREEZE_FS)\n - deactivate_locked_super\n\nSince f2fs has almost the same logic as ext4 [2] when handling critical\nerror in filesystem if it mounts w/ errors=remount-ro option:\n- set CP_ERROR_FLAG flag which indicates filesystem is stopped\n- record errors to superblock\n- set SB_RDONLY falg\nOnce we set CP_ERROR_FLAG flag, all writable interfaces can detect the\nflag and stop any further updates on filesystem. So, it is safe to not\nset SB_RDONLY flag, let's remove the logic and keep in line w/ ext4 [3].\n\n[1] https://lore.kernel.org/all/20240729-himbeeren-funknetz-96e62f9c7aee@brauner\n[2] https://lore.kernel.org/all/20240729132721.hxih6ehigadqf7wx@quack3\n[3] https://lore.kernel.org/linux-ext4/20240805201241.27286-1-jack@suse.cz" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/1f63f405c1a1a64b9c310388aad7055fb86b245c", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/649ec8b30df113042588bd3d3cd4e98bcb1091e0", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/930c6ab93492c4b15436524e704950b364b2930c", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/de43021c72993877a8f86f9fddfa0687609da5a4", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-476xx/CVE-2024-47690.json b/CVE-2024/CVE-2024-476xx/CVE-2024-47690.json new file mode 100644 index 00000000000..4bc6c1516e2 --- /dev/null +++ b/CVE-2024/CVE-2024-476xx/CVE-2024-47690.json @@ -0,0 +1,41 @@ +{ + "id": "CVE-2024-47690", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2024-10-21T12:15:05.800", + "lastModified": "2024-10-21T12:15:05.800", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nf2fs: get rid of online repaire on corrupted directory\n\nsyzbot reports a f2fs bug as below:\n\nkernel BUG at fs/f2fs/inode.c:896!\nRIP: 0010:f2fs_evict_inode+0x1598/0x15c0 fs/f2fs/inode.c:896\nCall Trace:\n evict+0x532/0x950 fs/inode.c:704\n dispose_list fs/inode.c:747 [inline]\n evict_inodes+0x5f9/0x690 fs/inode.c:797\n generic_shutdown_super+0x9d/0x2d0 fs/super.c:627\n kill_block_super+0x44/0x90 fs/super.c:1696\n kill_f2fs_super+0x344/0x690 fs/f2fs/super.c:4898\n deactivate_locked_super+0xc4/0x130 fs/super.c:473\n cleanup_mnt+0x41f/0x4b0 fs/namespace.c:1373\n task_work_run+0x24f/0x310 kernel/task_work.c:228\n ptrace_notify+0x2d2/0x380 kernel/signal.c:2402\n ptrace_report_syscall include/linux/ptrace.h:415 [inline]\n ptrace_report_syscall_exit include/linux/ptrace.h:477 [inline]\n syscall_exit_work+0xc6/0x190 kernel/entry/common.c:173\n syscall_exit_to_user_mode_prepare kernel/entry/common.c:200 [inline]\n __syscall_exit_to_user_mode_work kernel/entry/common.c:205 [inline]\n syscall_exit_to_user_mode+0x279/0x370 kernel/entry/common.c:218\n do_syscall_64+0x100/0x230 arch/x86/entry/common.c:89\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\nRIP: 0010:f2fs_evict_inode+0x1598/0x15c0 fs/f2fs/inode.c:896\n\nOnline repaire on corrupted directory in f2fs_lookup() can generate\ndirty data/meta while racing w/ readonly remount, it may leave dirty\ninode after filesystem becomes readonly, however, checkpoint() will\nskips flushing dirty inode in a state of readonly mode, result in\nabove panic.\n\nLet's get rid of online repaire in f2fs_lookup(), and leave the work\nto fsck.f2fs." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/884ee6dc85b959bc152f15bca80c30f06069e6c4", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/8be95cd607478d85fa4626e86f811e785905bcbf", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/bcefd0b0611f35b560d0a7281d87529fbe7a1e32", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/e8d64f598eeb079c42a52deaa3a91312c736a49d", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/f4746f2d79507f65cfbde11d3c39ee8338aa50af", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/f9ce2f550d53d044ecfb5ce996406cf42cd6b84d", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-476xx/CVE-2024-47691.json b/CVE-2024/CVE-2024-476xx/CVE-2024-47691.json new file mode 100644 index 00000000000..05893fb408d --- /dev/null +++ b/CVE-2024/CVE-2024-476xx/CVE-2024-47691.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2024-47691", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2024-10-21T12:15:05.880", + "lastModified": "2024-10-21T12:15:05.880", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nf2fs: fix to avoid use-after-free in f2fs_stop_gc_thread()\n\nsyzbot reports a f2fs bug as below:\n\n __dump_stack lib/dump_stack.c:88 [inline]\n dump_stack_lvl+0x241/0x360 lib/dump_stack.c:114\n print_report+0xe8/0x550 mm/kasan/report.c:491\n kasan_report+0x143/0x180 mm/kasan/report.c:601\n kasan_check_range+0x282/0x290 mm/kasan/generic.c:189\n instrument_atomic_read_write include/linux/instrumented.h:96 [inline]\n atomic_fetch_add_relaxed include/linux/atomic/atomic-instrumented.h:252 [inline]\n __refcount_add include/linux/refcount.h:184 [inline]\n __refcount_inc include/linux/refcount.h:241 [inline]\n refcount_inc include/linux/refcount.h:258 [inline]\n get_task_struct include/linux/sched/task.h:118 [inline]\n kthread_stop+0xca/0x630 kernel/kthread.c:704\n f2fs_stop_gc_thread+0x65/0xb0 fs/f2fs/gc.c:210\n f2fs_do_shutdown+0x192/0x540 fs/f2fs/file.c:2283\n f2fs_ioc_shutdown fs/f2fs/file.c:2325 [inline]\n __f2fs_ioctl+0x443a/0xbe60 fs/f2fs/file.c:4325\n vfs_ioctl fs/ioctl.c:51 [inline]\n __do_sys_ioctl fs/ioctl.c:907 [inline]\n __se_sys_ioctl+0xfc/0x170 fs/ioctl.c:893\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n\nThe root cause is below race condition, it may cause use-after-free\nissue in sbi->gc_th pointer.\n\n- remount\n - f2fs_remount\n - f2fs_stop_gc_thread\n - kfree(gc_th)\n\t\t\t\t- f2fs_ioc_shutdown\n\t\t\t\t - f2fs_do_shutdown\n\t\t\t\t - f2fs_stop_gc_thread\n\t\t\t\t - kthread_stop(gc_th->f2fs_gc_task)\n : sbi->gc_thread = NULL;\n\nWe will call f2fs_do_shutdown() in two paths:\n- for f2fs_ioc_shutdown() path, we should grab sb->s_umount semaphore\nfor fixing.\n- for f2fs_shutdown() path, it's safe since caller has already grabbed\nsb->s_umount semaphore." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/7c339dee7eb0f8e4cadc317c595f898ef04dae30", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/c7f114d864ac91515bb07ac271e9824a20f5ed95", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/d79343cd66343709e409d96b2abb139a0a55ce34", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/fc18e655b62ac6bc9f12f5de0d749b4a3fe1e812", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-476xx/CVE-2024-47692.json b/CVE-2024/CVE-2024-476xx/CVE-2024-47692.json new file mode 100644 index 00000000000..083d652d33a --- /dev/null +++ b/CVE-2024/CVE-2024-476xx/CVE-2024-47692.json @@ -0,0 +1,45 @@ +{ + "id": "CVE-2024-47692", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2024-10-21T12:15:05.953", + "lastModified": "2024-10-21T12:15:05.953", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnfsd: return -EINVAL when namelen is 0\n\nWhen we have a corrupted main.sqlite in /var/lib/nfs/nfsdcld/, it may\nresult in namelen being 0, which will cause memdup_user() to return\nZERO_SIZE_PTR.\nWhen we access the name.data that has been assigned the value of\nZERO_SIZE_PTR in nfs4_client_to_reclaim(), null pointer dereference is\ntriggered.\n\n[ T1205] ==================================================================\n[ T1205] BUG: KASAN: null-ptr-deref in nfs4_client_to_reclaim+0xe9/0x260\n[ T1205] Read of size 1 at addr 0000000000000010 by task nfsdcld/1205\n[ T1205]\n[ T1205] CPU: 11 PID: 1205 Comm: nfsdcld Not tainted 5.10.0-00003-g2c1423731b8d #406\n[ T1205] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS ?-20190727_073836-buildvm-ppc64le-16.ppc.fedoraproject.org-3.fc31 04/01/2014\n[ T1205] Call Trace:\n[ T1205] dump_stack+0x9a/0xd0\n[ T1205] ? nfs4_client_to_reclaim+0xe9/0x260\n[ T1205] __kasan_report.cold+0x34/0x84\n[ T1205] ? nfs4_client_to_reclaim+0xe9/0x260\n[ T1205] kasan_report+0x3a/0x50\n[ T1205] nfs4_client_to_reclaim+0xe9/0x260\n[ T1205] ? nfsd4_release_lockowner+0x410/0x410\n[ T1205] cld_pipe_downcall+0x5ca/0x760\n[ T1205] ? nfsd4_cld_tracking_exit+0x1d0/0x1d0\n[ T1205] ? down_write_killable_nested+0x170/0x170\n[ T1205] ? avc_policy_seqno+0x28/0x40\n[ T1205] ? selinux_file_permission+0x1b4/0x1e0\n[ T1205] rpc_pipe_write+0x84/0xb0\n[ T1205] vfs_write+0x143/0x520\n[ T1205] ksys_write+0xc9/0x170\n[ T1205] ? __ia32_sys_read+0x50/0x50\n[ T1205] ? ktime_get_coarse_real_ts64+0xfe/0x110\n[ T1205] ? ktime_get_coarse_real_ts64+0xa2/0x110\n[ T1205] do_syscall_64+0x33/0x40\n[ T1205] entry_SYSCALL_64_after_hwframe+0x67/0xd1\n[ T1205] RIP: 0033:0x7fdbdb761bc7\n[ T1205] Code: 0f 00 f7 d8 64 89 02 48 c7 c0 ff ff ff ff eb b7 0f 1f 00 f3 0f 1e fa 64 8b 04 25 18 00 00 00 85 c0 75 10 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 514\n[ T1205] RSP: 002b:00007fff8c4b7248 EFLAGS: 00000246 ORIG_RAX: 0000000000000001\n[ T1205] RAX: ffffffffffffffda RBX: 000000000000042b RCX: 00007fdbdb761bc7\n[ T1205] RDX: 000000000000042b RSI: 00007fff8c4b75f0 RDI: 0000000000000008\n[ T1205] RBP: 00007fdbdb761bb0 R08: 0000000000000000 R09: 0000000000000001\n[ T1205] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000042b\n[ T1205] R13: 0000000000000008 R14: 00007fff8c4b75f0 R15: 0000000000000000\n[ T1205] ==================================================================\n\nFix it by checking namelen." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/0f1d007bbea38a61cf9c5392708dc70ae9d84a3d", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/1ff8be8d008b9ddc8e7043fbddd37d5d451b271b", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/22451a16b7ab7debefce660672566be887db1637", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/318f70857caab3da9a6ada9bc8c1f4f7591b695e", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/766d5fbd78f7a52b3888449a0358760477b74602", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/84a563d136faf514fdad1ade28d7a142fd313cb8", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/b7b7a8df41ef18862dd6b22289fb46c2c12398af", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-476xx/CVE-2024-47693.json b/CVE-2024/CVE-2024-476xx/CVE-2024-47693.json new file mode 100644 index 00000000000..e7c7a59cc9a --- /dev/null +++ b/CVE-2024/CVE-2024-476xx/CVE-2024-47693.json @@ -0,0 +1,41 @@ +{ + "id": "CVE-2024-47693", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2024-10-21T12:15:06.033", + "lastModified": "2024-10-21T12:15:06.033", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nIB/core: Fix ib_cache_setup_one error flow cleanup\n\nWhen ib_cache_update return an error, we exit ib_cache_setup_one\ninstantly with no proper cleanup, even though before this we had\nalready successfully done gid_table_setup_one, that results in\nthe kernel WARN below.\n\nDo proper cleanup using gid_table_cleanup_one before returning\nthe err in order to fix the issue.\n\nWARNING: CPU: 4 PID: 922 at drivers/infiniband/core/cache.c:806 gid_table_release_one+0x181/0x1a0\nModules linked in:\nCPU: 4 UID: 0 PID: 922 Comm: c_repro Not tainted 6.11.0-rc1+ #3\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014\nRIP: 0010:gid_table_release_one+0x181/0x1a0\nCode: 44 8b 38 75 0c e8 2f cb 34 ff 4d 8b b5 28 05 00 00 e8 23 cb 34 ff 44 89 f9 89 da 4c 89 f6 48 c7 c7 d0 58 14 83 e8 4f de 21 ff <0f> 0b 4c 8b 75 30 e9 54 ff ff ff 48 8 3 c4 10 5b 5d 41 5c 41 5d 41\nRSP: 0018:ffffc90002b835b0 EFLAGS: 00010286\nRAX: 0000000000000000 RBX: 0000000000000000 RCX: ffffffff811c8527\nRDX: 0000000000000000 RSI: ffffffff811c8534 RDI: 0000000000000001\nRBP: ffff8881011b3d00 R08: ffff88810b3abe00 R09: 205d303839303631\nR10: 666572207972746e R11: 72746e6520444947 R12: 0000000000000001\nR13: ffff888106390000 R14: ffff8881011f2110 R15: 0000000000000001\nFS: 00007fecc3b70800(0000) GS:ffff88813bd00000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 0000000020000340 CR3: 000000010435a001 CR4: 00000000003706b0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nCall Trace:\n \n ? show_regs+0x94/0xa0\n ? __warn+0x9e/0x1c0\n ? gid_table_release_one+0x181/0x1a0\n ? report_bug+0x1f9/0x340\n ? gid_table_release_one+0x181/0x1a0\n ? handle_bug+0xa2/0x110\n ? exc_invalid_op+0x31/0xa0\n ? asm_exc_invalid_op+0x16/0x20\n ? __warn_printk+0xc7/0x180\n ? __warn_printk+0xd4/0x180\n ? gid_table_release_one+0x181/0x1a0\n ib_device_release+0x71/0xe0\n ? __pfx_ib_device_release+0x10/0x10\n device_release+0x44/0xd0\n kobject_put+0x135/0x3d0\n put_device+0x20/0x30\n rxe_net_add+0x7d/0xa0\n rxe_newlink+0xd7/0x190\n nldev_newlink+0x1b0/0x2a0\n ? __pfx_nldev_newlink+0x10/0x10\n rdma_nl_rcv_msg+0x1ad/0x2e0\n rdma_nl_rcv_skb.constprop.0+0x176/0x210\n netlink_unicast+0x2de/0x400\n netlink_sendmsg+0x306/0x660\n __sock_sendmsg+0x110/0x120\n ____sys_sendmsg+0x30e/0x390\n ___sys_sendmsg+0x9b/0xf0\n ? kstrtouint+0x6e/0xa0\n ? kstrtouint_from_user+0x7c/0xb0\n ? get_pid_task+0xb0/0xd0\n ? proc_fail_nth_write+0x5b/0x140\n ? __fget_light+0x9a/0x200\n ? preempt_count_add+0x47/0xa0\n __sys_sendmsg+0x61/0xd0\n do_syscall_64+0x50/0x110\n entry_SYSCALL_64_after_hwframe+0x76/0x7e" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/1403c8b14765eab805377dd3b75e96ace8747aed", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/1730d47d1865af89efd01cf0469a9a739cbf60f2", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/290fe42fe0165205c4451334d8833a9202ae1d52", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/45f63f4bb9a7128a6209d766c2fc02b3d42fbf3e", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/af633fd9d9fff59e31c804f47ca0c8a784977773", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/d08754be993f270e3d296d8f5d8e071fe6638651", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-476xx/CVE-2024-47694.json b/CVE-2024/CVE-2024-476xx/CVE-2024-47694.json new file mode 100644 index 00000000000..c15f5ff2f5f --- /dev/null +++ b/CVE-2024/CVE-2024-476xx/CVE-2024-47694.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-47694", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2024-10-21T12:15:06.107", + "lastModified": "2024-10-21T12:15:06.107", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nIB/mlx5: Fix UMR pd cleanup on error flow of driver init\n\nThe cited commit moves the pd allocation from function\nmlx5r_umr_resource_cleanup() to a new function mlx5r_umr_cleanup().\nSo the fix in commit [1] is broken. In error flow, will hit panic [2].\n\nFix it by checking pd pointer to avoid panic if it is NULL;\n\n[1] RDMA/mlx5: Fix UMR cleanup on error flow of driver init\n[2]\n [ 347.567063] infiniband mlx5_0: Couldn't register device with driver model\n [ 347.591382] BUG: kernel NULL pointer dereference, address: 0000000000000020\n [ 347.593438] #PF: supervisor read access in kernel mode\n [ 347.595176] #PF: error_code(0x0000) - not-present page\n [ 347.596962] PGD 0 P4D 0\n [ 347.601361] RIP: 0010:ib_dealloc_pd_user+0x12/0xc0 [ib_core]\n [ 347.604171] RSP: 0018:ffff888106293b10 EFLAGS: 00010282\n [ 347.604834] RAX: 0000000000000000 RBX: 000000000000000e RCX: 0000000000000000\n [ 347.605672] RDX: ffff888106293ad0 RSI: 0000000000000000 RDI: 0000000000000000\n [ 347.606529] RBP: 0000000000000000 R08: ffff888106293ae0 R09: ffff888106293ae0\n [ 347.607379] R10: 0000000000000a06 R11: 0000000000000000 R12: 0000000000000000\n [ 347.608224] R13: ffffffffa0704dc0 R14: 0000000000000001 R15: 0000000000000001\n [ 347.609067] FS: 00007fdc720cd9c0(0000) GS:ffff88852c880000(0000) knlGS:0000000000000000\n [ 347.610094] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n [ 347.610727] CR2: 0000000000000020 CR3: 0000000103012003 CR4: 0000000000370eb0\n [ 347.611421] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n [ 347.612113] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n [ 347.612804] Call Trace:\n [ 347.613130] \n [ 347.613417] ? __die+0x20/0x60\n [ 347.613793] ? page_fault_oops+0x150/0x3e0\n [ 347.614243] ? free_msg+0x68/0x80 [mlx5_core]\n [ 347.614840] ? cmd_exec+0x48f/0x11d0 [mlx5_core]\n [ 347.615359] ? exc_page_fault+0x74/0x130\n [ 347.615808] ? asm_exc_page_fault+0x22/0x30\n [ 347.616273] ? ib_dealloc_pd_user+0x12/0xc0 [ib_core]\n [ 347.616801] mlx5r_umr_cleanup+0x23/0x90 [mlx5_ib]\n [ 347.617365] mlx5_ib_stage_pre_ib_reg_umr_cleanup+0x36/0x40 [mlx5_ib]\n [ 347.618025] __mlx5_ib_add+0x96/0xd0 [mlx5_ib]\n [ 347.618539] mlx5r_probe+0xe9/0x310 [mlx5_ib]\n [ 347.619032] ? kernfs_add_one+0x107/0x150\n [ 347.619478] ? __mlx5_ib_add+0xd0/0xd0 [mlx5_ib]\n [ 347.619984] auxiliary_bus_probe+0x3e/0x90\n [ 347.620448] really_probe+0xc5/0x3a0\n [ 347.620857] __driver_probe_device+0x80/0x160\n [ 347.621325] driver_probe_device+0x1e/0x90\n [ 347.621770] __driver_attach+0xec/0x1c0\n [ 347.622213] ? __device_attach_driver+0x100/0x100\n [ 347.622724] bus_for_each_dev+0x71/0xc0\n [ 347.623151] bus_add_driver+0xed/0x240\n [ 347.623570] driver_register+0x58/0x100\n [ 347.623998] __auxiliary_driver_register+0x6a/0xc0\n [ 347.624499] ? driver_register+0xae/0x100\n [ 347.624940] ? 0xffffffffa0893000\n [ 347.625329] mlx5_ib_init+0x16a/0x1e0 [mlx5_ib]\n [ 347.625845] do_one_initcall+0x4a/0x2a0\n [ 347.626273] ? gcov_event+0x2e2/0x3a0\n [ 347.626706] do_init_module+0x8a/0x260\n [ 347.627126] init_module_from_file+0x8b/0xd0\n [ 347.627596] __x64_sys_finit_module+0x1ca/0x2f0\n [ 347.628089] do_syscall_64+0x4c/0x100" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/112e6e83a894260cc7efe79a1fc47d4d51461742", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/99e2de5942b0390ddc24efada71edc6593e23f05", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-476xx/CVE-2024-47695.json b/CVE-2024/CVE-2024-476xx/CVE-2024-47695.json new file mode 100644 index 00000000000..60ae2eab1f8 --- /dev/null +++ b/CVE-2024/CVE-2024-476xx/CVE-2024-47695.json @@ -0,0 +1,41 @@ +{ + "id": "CVE-2024-47695", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2024-10-21T12:15:06.180", + "lastModified": "2024-10-21T12:15:06.180", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/rtrs-clt: Reset cid to con_num - 1 to stay in bounds\n\nIn the function init_conns(), after the create_con() and create_cm() for\nloop if something fails. In the cleanup for loop after the destroy tag, we\naccess out of bound memory because cid is set to clt_path->s.con_num.\n\nThis commits resets the cid to clt_path->s.con_num - 1, to stay in bounds\nin the cleanup loop later." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/01b9be936ee8839ab9f83a7e84ee02ac6c8303c4", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/0429a4e972082e3a2351da414b1c017daaf8aed2", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/1c50e0265fa332c94a4a182e4efa0fc70d8fad94", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/3e4289b29e216a55d08a89e126bc0b37cbad9f38", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/5ac73f8191f3de41fef4f934d84d97f3aadb301f", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/c8b7f3d9fada0d4b4b7db86bf7345cd61f1d972e", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-476xx/CVE-2024-47696.json b/CVE-2024/CVE-2024-476xx/CVE-2024-47696.json new file mode 100644 index 00000000000..bbe39b38b2b --- /dev/null +++ b/CVE-2024/CVE-2024-476xx/CVE-2024-47696.json @@ -0,0 +1,45 @@ +{ + "id": "CVE-2024-47696", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2024-10-21T12:15:06.257", + "lastModified": "2024-10-21T12:15:06.257", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/iwcm: Fix WARNING:at_kernel/workqueue.c:#check_flush_dependency\n\nIn the commit aee2424246f9 (\"RDMA/iwcm: Fix a use-after-free related to\ndestroying CM IDs\"), the function flush_workqueue is invoked to flush the\nwork queue iwcm_wq.\n\nBut at that time, the work queue iwcm_wq was created via the function\nalloc_ordered_workqueue without the flag WQ_MEM_RECLAIM.\n\nBecause the current process is trying to flush the whole iwcm_wq, if\niwcm_wq doesn't have the flag WQ_MEM_RECLAIM, verify that the current\nprocess is not reclaiming memory or running on a workqueue which doesn't\nhave the flag WQ_MEM_RECLAIM as that can break forward-progress guarantee\nleading to a deadlock.\n\nThe call trace is as below:\n\n[ 125.350876][ T1430] Call Trace:\n[ 125.356281][ T1430] \n[ 125.361285][ T1430] ? __warn (kernel/panic.c:693)\n[ 125.367640][ T1430] ? check_flush_dependency (kernel/workqueue.c:3706 (discriminator 9))\n[ 125.375689][ T1430] ? report_bug (lib/bug.c:180 lib/bug.c:219)\n[ 125.382505][ T1430] ? handle_bug (arch/x86/kernel/traps.c:239)\n[ 125.388987][ T1430] ? exc_invalid_op (arch/x86/kernel/traps.c:260 (discriminator 1))\n[ 125.395831][ T1430] ? asm_exc_invalid_op (arch/x86/include/asm/idtentry.h:621)\n[ 125.403125][ T1430] ? check_flush_dependency (kernel/workqueue.c:3706 (discriminator 9))\n[ 125.410984][ T1430] ? check_flush_dependency (kernel/workqueue.c:3706 (discriminator 9))\n[ 125.418764][ T1430] __flush_workqueue (kernel/workqueue.c:3970)\n[ 125.426021][ T1430] ? __pfx___might_resched (kernel/sched/core.c:10151)\n[ 125.433431][ T1430] ? destroy_cm_id (drivers/infiniband/core/iwcm.c:375) iw_cm\n[ 125.441209][ T1430] ? __pfx___flush_workqueue (kernel/workqueue.c:3910)\n[ 125.473900][ T1430] ? _raw_spin_lock_irqsave (arch/x86/include/asm/atomic.h:107 include/linux/atomic/atomic-arch-fallback.h:2170 include/linux/atomic/atomic-instrumented.h:1302 include/asm-generic/qspinlock.h:111 include/linux/spinlock.h:187 include/linux/spinlock_api_smp.h:111 kernel/locking/spinlock.c:162)\n[ 125.473909][ T1430] ? __pfx__raw_spin_lock_irqsave (kernel/locking/spinlock.c:161)\n[ 125.482537][ T1430] _destroy_id (drivers/infiniband/core/cma.c:2044) rdma_cm\n[ 125.495072][ T1430] nvme_rdma_free_queue (drivers/nvme/host/rdma.c:656 drivers/nvme/host/rdma.c:650) nvme_rdma\n[ 125.505827][ T1430] nvme_rdma_reset_ctrl_work (drivers/nvme/host/rdma.c:2180) nvme_rdma\n[ 125.505831][ T1430] process_one_work (kernel/workqueue.c:3231)\n[ 125.515122][ T1430] worker_thread (kernel/workqueue.c:3306 kernel/workqueue.c:3393)\n[ 125.515127][ T1430] ? __pfx_worker_thread (kernel/workqueue.c:3339)\n[ 125.531837][ T1430] kthread (kernel/kthread.c:389)\n[ 125.539864][ T1430] ? __pfx_kthread (kernel/kthread.c:342)\n[ 125.550628][ T1430] ret_from_fork (arch/x86/kernel/process.c:147)\n[ 125.558840][ T1430] ? __pfx_kthread (kernel/kthread.c:342)\n[ 125.558844][ T1430] ret_from_fork_asm (arch/x86/entry/entry_64.S:257)\n[ 125.566487][ T1430] \n[ 125.566488][ T1430] ---[ end trace 0000000000000000 ]---" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/2efe8da2ddbf873385b4bc55366d09350b408df6", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/86dfdd8288907f03c18b7fb462e0e232c4f98d89", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/8b7df76356d098f85f3bd2c7cf6fb43f531893d7", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/a09dc967b3c58899e259c0aea092f421d22a0b04", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/a64f30db12bdc937c5108158d98c8eab1925c548", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/c8b18a75282cfd27822a8cc3c1f005c1ac8d1a58", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/da0392698c62397c19deb1b9e9bdf2fbb5a9420e", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-476xx/CVE-2024-47697.json b/CVE-2024/CVE-2024-476xx/CVE-2024-47697.json new file mode 100644 index 00000000000..eeb60c55eba --- /dev/null +++ b/CVE-2024/CVE-2024-476xx/CVE-2024-47697.json @@ -0,0 +1,45 @@ +{ + "id": "CVE-2024-47697", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2024-10-21T12:15:06.343", + "lastModified": "2024-10-21T12:15:06.343", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrivers: media: dvb-frontends/rtl2830: fix an out-of-bounds write error\n\nEnsure index in rtl2830_pid_filter does not exceed 31 to prevent\nout-of-bounds access.\n\ndev->filters is a 32-bit value, so set_bit and clear_bit functions should\nonly operate on indices from 0 to 31. If index is 32, it will attempt to\naccess a non-existent 33rd bit, leading to out-of-bounds access.\nChange the boundary check from index > 32 to index >= 32 to resolve this\nissue." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/042b101d7bf70616c4967c286ffa6fcca65babfb", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/3dba83d3c81de1368d15a39f22df7b53e306052f", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/46d7ebfe6a75a454a5fa28604f0ef1491f9d8d14", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/58f31be7dfbc0c84a6497ad51924949cf64b86a2", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/7fd6aae7e53b94f4035b1bfce28b8dfa0d0ae470", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/86d920d2600c3a48efc2775c1666c1017eec6956", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/badbd736e6649c4e6d7b4ff7e2b9857acfa9ea94", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-476xx/CVE-2024-47698.json b/CVE-2024/CVE-2024-476xx/CVE-2024-47698.json new file mode 100644 index 00000000000..43714c46f22 --- /dev/null +++ b/CVE-2024/CVE-2024-476xx/CVE-2024-47698.json @@ -0,0 +1,45 @@ +{ + "id": "CVE-2024-47698", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2024-10-21T12:15:06.423", + "lastModified": "2024-10-21T12:15:06.423", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrivers: media: dvb-frontends/rtl2832: fix an out-of-bounds write error\n\nEnsure index in rtl2832_pid_filter does not exceed 31 to prevent\nout-of-bounds access.\n\ndev->filters is a 32-bit value, so set_bit and clear_bit functions should\nonly operate on indices from 0 to 31. If index is 32, it will attempt to\naccess a non-existent 33rd bit, leading to out-of-bounds access.\nChange the boundary check from index > 32 to index >= 32 to resolve this\nissue.\n\n[hverkuil: added fixes tag, rtl2830_pid_filter -> rtl2832_pid_filter in logmsg]" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/15bea004e939d938a6771dfcf2a26cc899ffd20a", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/527ab3eb3b0b4a6ee00e183c1de6a730239e2835", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/66dbe0df6eccc7ee53a2c35016ce81e13b3ff447", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/6ae3b9aee42616ee93c4585174f40c767828006d", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/8ae06f360cfaca2b88b98ca89144548b3186aab1", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/a879b6cdd48134a3d58949ea4f075c75fa2d7d71", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/bedd42e07988dbdd124b23e758ffef7a681b9c60", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-476xx/CVE-2024-47699.json b/CVE-2024/CVE-2024-476xx/CVE-2024-47699.json new file mode 100644 index 00000000000..d80be89dd63 --- /dev/null +++ b/CVE-2024/CVE-2024-476xx/CVE-2024-47699.json @@ -0,0 +1,45 @@ +{ + "id": "CVE-2024-47699", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2024-10-21T12:15:06.503", + "lastModified": "2024-10-21T12:15:06.503", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnilfs2: fix potential null-ptr-deref in nilfs_btree_insert()\n\nPatch series \"nilfs2: fix potential issues with empty b-tree nodes\".\n\nThis series addresses three potential issues with empty b-tree nodes that\ncan occur with corrupted filesystem images, including one recently\ndiscovered by syzbot.\n\n\nThis patch (of 3):\n\nIf a b-tree is broken on the device, and the b-tree height is greater than\n2 (the level of the root node is greater than 1) even if the number of\nchild nodes of the b-tree root is 0, a NULL pointer dereference occurs in\nnilfs_btree_prepare_insert(), which is called from nilfs_btree_insert().\n\nThis is because, when the number of child nodes of the b-tree root is 0,\nnilfs_btree_do_lookup() does not set the block buffer head in any of\npath[x].bp_bh, leaving it as the initial value of NULL, but if the level\nof the b-tree root node is greater than 1, nilfs_btree_get_nonroot_node(),\nwhich accesses the buffer memory of path[x].bp_bh, is called.\n\nFix this issue by adding a check to nilfs_btree_root_broken(), which\nperforms sanity checks when reading the root node from the device, to\ndetect this inconsistency.\n\nThanks to Lizhi Xu for trying to solve the bug and clarifying the cause\nearly on." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/21839b6fbc3c41b3e374ecbdb0cabbbb2c53cf34", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/24bf40740a3da6b4056721da34997ae6938f3da1", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/3644554d308ddf2669e459a1551a7edf60b2d62b", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/73d23ecf234b7a6d47fb883f2dabe10e3230b31d", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/9403001ad65ae4f4c5de368bdda3a0636b51d51a", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/db73500d3f0e558eb642aae1d4782e7726b4a03f", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/f68523e0f26faade18833fbef577a4295d8e2c94", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-477xx/CVE-2024-47700.json b/CVE-2024/CVE-2024-477xx/CVE-2024-47700.json new file mode 100644 index 00000000000..fe9e98ae3a6 --- /dev/null +++ b/CVE-2024/CVE-2024-477xx/CVE-2024-47700.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2024-47700", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2024-10-21T12:15:06.593", + "lastModified": "2024-10-21T12:15:06.593", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\next4: check stripe size compatibility on remount as well\n\nWe disable stripe size in __ext4_fill_super if it is not a multiple of\nthe cluster ratio however this check is missed when trying to remount.\nThis can leave us with cases where stripe < cluster_ratio after\nremount:set making EXT4_B2C(sbi->s_stripe) become 0 that can cause some\nunforeseen bugs like divide by 0.\n\nFix that by adding the check in remount path as well." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/297615e992bbb30a55c158141086be6505d5d722", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/a31b712f75445d52fc0451dc54fd7b16a552cb7c", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/ee85e0938aa8f9846d21e4d302c3cf6a2a75110d", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/faeff8b1ee2eaa5969c8e994d66c3337298cefed", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-477xx/CVE-2024-47701.json b/CVE-2024/CVE-2024-477xx/CVE-2024-47701.json new file mode 100644 index 00000000000..0ae4d259c95 --- /dev/null +++ b/CVE-2024/CVE-2024-477xx/CVE-2024-47701.json @@ -0,0 +1,45 @@ +{ + "id": "CVE-2024-47701", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2024-10-21T12:15:06.663", + "lastModified": "2024-10-21T12:15:06.663", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\next4: avoid OOB when system.data xattr changes underneath the filesystem\n\nWhen looking up for an entry in an inlined directory, if e_value_offs is\nchanged underneath the filesystem by some change in the block device, it\nwill lead to an out-of-bounds access that KASAN detects as an UAF.\n\nEXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none.\nloop0: detected capacity change from 2048 to 2047\n==================================================================\nBUG: KASAN: use-after-free in ext4_search_dir+0xf2/0x1c0 fs/ext4/namei.c:1500\nRead of size 1 at addr ffff88803e91130f by task syz-executor269/5103\n\nCPU: 0 UID: 0 PID: 5103 Comm: syz-executor269 Not tainted 6.11.0-rc4-syzkaller #0\nHardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014\nCall Trace:\n \n __dump_stack lib/dump_stack.c:93 [inline]\n dump_stack_lvl+0x241/0x360 lib/dump_stack.c:119\n print_address_description mm/kasan/report.c:377 [inline]\n print_report+0x169/0x550 mm/kasan/report.c:488\n kasan_report+0x143/0x180 mm/kasan/report.c:601\n ext4_search_dir+0xf2/0x1c0 fs/ext4/namei.c:1500\n ext4_find_inline_entry+0x4be/0x5e0 fs/ext4/inline.c:1697\n __ext4_find_entry+0x2b4/0x1b30 fs/ext4/namei.c:1573\n ext4_lookup_entry fs/ext4/namei.c:1727 [inline]\n ext4_lookup+0x15f/0x750 fs/ext4/namei.c:1795\n lookup_one_qstr_excl+0x11f/0x260 fs/namei.c:1633\n filename_create+0x297/0x540 fs/namei.c:3980\n do_symlinkat+0xf9/0x3a0 fs/namei.c:4587\n __do_sys_symlinkat fs/namei.c:4610 [inline]\n __se_sys_symlinkat fs/namei.c:4607 [inline]\n __x64_sys_symlinkat+0x95/0xb0 fs/namei.c:4607\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\nRIP: 0033:0x7f3e73ced469\nCode: 28 00 00 00 75 05 48 83 c4 28 c3 e8 21 18 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48\nRSP: 002b:00007fff4d40c258 EFLAGS: 00000246 ORIG_RAX: 000000000000010a\nRAX: ffffffffffffffda RBX: 0032656c69662f2e RCX: 00007f3e73ced469\nRDX: 0000000020000200 RSI: 00000000ffffff9c RDI: 00000000200001c0\nRBP: 0000000000000000 R08: 00007fff4d40c290 R09: 00007fff4d40c290\nR10: 0023706f6f6c2f76 R11: 0000000000000246 R12: 00007fff4d40c27c\nR13: 0000000000000003 R14: 431bde82d7b634db R15: 00007fff4d40c2b0\n \n\nCalling ext4_xattr_ibody_find right after reading the inode with\next4_get_inode_loc will lead to a check of the validity of the xattrs,\navoiding this problem." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/2a6579ef5f2576a940125729f7409cc182f1c8df", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/371d0bacecd529f887ea2547333d9173e7bcdc0a", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/7fc22c3b3ffc0e952f5e0062dd11aa6ae76affba", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/be2e9b111e2790962cc66a177869b4e9717b4e29", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/c6b72f5d82b1017bad80f9ebf502832fc321d796", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/ccb8c18076e2e630fea23fbec583cdad61787fc5", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/ea32883e4a03ed575a2eb7a66542022312bde477", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-477xx/CVE-2024-47702.json b/CVE-2024/CVE-2024-477xx/CVE-2024-47702.json new file mode 100644 index 00000000000..057552ae581 --- /dev/null +++ b/CVE-2024/CVE-2024-477xx/CVE-2024-47702.json @@ -0,0 +1,29 @@ +{ + "id": "CVE-2024-47702", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2024-10-21T12:15:06.743", + "lastModified": "2024-10-21T12:15:06.743", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Fail verification for sign-extension of packet data/data_end/data_meta\n\nsyzbot reported a kernel crash due to\n commit 1f1e864b6555 (\"bpf: Handle sign-extenstin ctx member accesses\").\nThe reason is due to sign-extension of 32-bit load for\npacket data/data_end/data_meta uapi field.\n\nThe original code looks like:\n r2 = *(s32 *)(r1 + 76) /* load __sk_buff->data */\n r3 = *(u32 *)(r1 + 80) /* load __sk_buff->data_end */\n r0 = r2\n r0 += 8\n if r3 > r0 goto +1\n ...\nNote that __sk_buff->data load has 32-bit sign extension.\n\nAfter verification and convert_ctx_accesses(), the final asm code looks like:\n r2 = *(u64 *)(r1 +208)\n r2 = (s32)r2\n r3 = *(u64 *)(r1 +80)\n r0 = r2\n r0 += 8\n if r3 > r0 goto pc+1\n ...\nNote that 'r2 = (s32)r2' may make the kernel __sk_buff->data address invalid\nwhich may cause runtime failure.\n\nCurrently, in C code, typically we have\n void *data = (void *)(long)skb->data;\n void *data_end = (void *)(long)skb->data_end;\n ...\nand it will generate\n r2 = *(u64 *)(r1 +208)\n r3 = *(u64 *)(r1 +80)\n r0 = r2\n r0 += 8\n if r3 > r0 goto pc+1\n\nIf we allow sign-extension,\n void *data = (void *)(long)(int)skb->data;\n void *data_end = (void *)(long)skb->data_end;\n ...\nthe generated code looks like\n r2 = *(u64 *)(r1 +208)\n r2 <<= 32\n r2 s>>= 32\n r3 = *(u64 *)(r1 +80)\n r0 = r2\n r0 += 8\n if r3 > r0 goto pc+1\nand this will cause verification failure since \"r2 <<= 32\" is not allowed\nas \"r2\" is a packet pointer.\n\nTo fix this issue for case\n r2 = *(s32 *)(r1 + 76) /* load __sk_buff->data */\nthis patch added additional checking in is_valid_access() callback\nfunction for packet data/data_end/data_meta access. If those accesses\nare with sign-extenstion, the verification will fail.\n\n [1] https://lore.kernel.org/bpf/000000000000c90eee061d236d37@google.com/" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/92de36080c93296ef9005690705cba260b9bd68a", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/f09757fe97a225ae505886eac572e4cbfba96537", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/f1620c93a1ec950d87ef327a565d3907736d3340", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-477xx/CVE-2024-47703.json b/CVE-2024/CVE-2024-477xx/CVE-2024-47703.json new file mode 100644 index 00000000000..54e9ba56ddb --- /dev/null +++ b/CVE-2024/CVE-2024-477xx/CVE-2024-47703.json @@ -0,0 +1,29 @@ +{ + "id": "CVE-2024-47703", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2024-10-21T12:15:06.823", + "lastModified": "2024-10-21T12:15:06.823", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf, lsm: Add check for BPF LSM return value\n\nA bpf prog returning a positive number attached to file_alloc_security\nhook makes kernel panic.\n\nThis happens because file system can not filter out the positive number\nreturned by the LSM prog using IS_ERR, and misinterprets this positive\nnumber as a file pointer.\n\nGiven that hook file_alloc_security never returned positive number\nbefore the introduction of BPF LSM, and other BPF LSM hooks may\nencounter similar issues, this patch adds LSM return value check\nin verifier, to ensure no unexpected value is returned." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/1050727d83e70449991c29dd1cf29fe936a63da3", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/27ca3e20fe80be85a92b10064dfeb56cb2564b1c", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/5d99e198be279045e6ecefe220f5c52f8ce9bfd5", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-477xx/CVE-2024-47704.json b/CVE-2024/CVE-2024-477xx/CVE-2024-47704.json new file mode 100644 index 00000000000..83f1bd30666 --- /dev/null +++ b/CVE-2024/CVE-2024-477xx/CVE-2024-47704.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2024-47704", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2024-10-21T12:15:06.923", + "lastModified": "2024-10-21T12:15:06.923", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: Check link_res->hpo_dp_link_enc before using it\n\n[WHAT & HOW]\nFunctions dp_enable_link_phy and dp_disable_link_phy can pass link_res\nwithout initializing hpo_dp_link_enc and it is necessary to check for\nnull before dereferencing.\n\nThis fixes 2 FORWARD_NULL issues reported by Coverity." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/0508a4e95ac1aefd851ceb97ea050d8abb93262c", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/0beca868cde8742240cd0038141c30482d2b7eb8", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/530e29452b955c30cf2102fa4d07420dc6e0c953", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/be2ca7a2c1561390d28bf2f92654d819659ba510", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-477xx/CVE-2024-47705.json b/CVE-2024/CVE-2024-477xx/CVE-2024-47705.json new file mode 100644 index 00000000000..20e1576c0ab --- /dev/null +++ b/CVE-2024/CVE-2024-477xx/CVE-2024-47705.json @@ -0,0 +1,45 @@ +{ + "id": "CVE-2024-47705", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2024-10-21T12:15:07.020", + "lastModified": "2024-10-21T12:15:07.020", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nblock: fix potential invalid pointer dereference in blk_add_partition\n\nThe blk_add_partition() function initially used a single if-condition\n(IS_ERR(part)) to check for errors when adding a partition. This was\nmodified to handle the specific case of -ENXIO separately, allowing the\nfunction to proceed without logging the error in this case. However,\nthis change unintentionally left a path where md_autodetect_dev()\ncould be called without confirming that part is a valid pointer.\n\nThis commit separates the error handling logic by splitting the\ninitial if-condition, improving code readability and handling specific\nerror scenarios explicitly. The function now distinguishes the general\nerror case from -ENXIO without altering the existing behavior of\nmd_autodetect_dev() calls." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/26e197b7f9240a4ac301dd0ad520c0c697c2ea7d", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/4bc4272e2506941c3f3d4fb8b0c659ee814dcf6f", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/64cf2a39202ca2d9df5ee70eb310b6141ce2b8ed", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/652039ba477c9a4ab43740cf2cb0d068d53508c2", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/80f5bfbb80ea1615290dbc24f49d3d8c86db58fe", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/afe53ea9b378c376101d99d216f13b6256f75189", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/cc4d21d9492db4e534d3e01253cf885c90dd2a8b", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-477xx/CVE-2024-47706.json b/CVE-2024/CVE-2024-477xx/CVE-2024-47706.json new file mode 100644 index 00000000000..a4e27352cb9 --- /dev/null +++ b/CVE-2024/CVE-2024-477xx/CVE-2024-47706.json @@ -0,0 +1,45 @@ +{ + "id": "CVE-2024-47706", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2024-10-21T12:15:07.120", + "lastModified": "2024-10-21T12:15:07.120", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nblock, bfq: fix possible UAF for bfqq->bic with merge chain\n\n1) initial state, three tasks:\n\n\t\tProcess 1 Process 2\tProcess 3\n\t\t (BIC1) (BIC2)\t\t (BIC3)\n\t\t | \u039b | \u039b\t\t | \u039b\n\t\t | | | |\t\t | |\n\t\t V | V |\t\t V |\n\t\t bfqq1 bfqq2\t\t bfqq3\nprocess ref:\t 1\t\t 1\t\t 1\n\n2) bfqq1 merged to bfqq2:\n\n\t\tProcess 1 Process 2\tProcess 3\n\t\t (BIC1) (BIC2)\t\t (BIC3)\n\t\t | |\t\t | \u039b\n\t\t \\--------------\\|\t\t | |\n\t\t V\t\t V |\n\t\t bfqq1--------->bfqq2\t\t bfqq3\nprocess ref:\t 0\t\t 2\t\t 1\n\n3) bfqq2 merged to bfqq3:\n\n\t\tProcess 1 Process 2\tProcess 3\n\t\t (BIC1) (BIC2)\t\t (BIC3)\n\t here -> \u039b |\t\t |\n\t\t \\--------------\\ \\-------------\\|\n\t\t V\t\t V\n\t\t bfqq1--------->bfqq2---------->bfqq3\nprocess ref:\t 0\t\t 1\t\t 3\n\nIn this case, IO from Process 1 will get bfqq2 from BIC1 first, and then\nget bfqq3 through merge chain, and finially handle IO by bfqq3.\nHowerver, current code will think bfqq2 is owned by BIC1, like initial\nstate, and set bfqq2->bic to BIC1.\n\nbfq_insert_request\n-> by Process 1\n bfqq = bfq_init_rq(rq)\n bfqq = bfq_get_bfqq_handle_split\n bfqq = bic_to_bfqq\n -> get bfqq2 from BIC1\n bfqq->ref++\n rq->elv.priv[0] = bic\n rq->elv.priv[1] = bfqq\n if (bfqq_process_refs(bfqq) == 1)\n bfqq->bic = bic\n -> record BIC1 to bfqq2\n\n __bfq_insert_request\n new_bfqq = bfq_setup_cooperator\n -> get bfqq3 from bfqq2->new_bfqq\n bfqq_request_freed(bfqq)\n new_bfqq->ref++\n rq->elv.priv[1] = new_bfqq\n -> handle IO by bfqq3\n\nFix the problem by checking bfqq is from merge chain fist. And this\nmight fix a following problem reported by our syzkaller(unreproducible):\n\n==================================================================\nBUG: KASAN: slab-use-after-free in bfq_do_early_stable_merge block/bfq-iosched.c:5692 [inline]\nBUG: KASAN: slab-use-after-free in bfq_do_or_sched_stable_merge block/bfq-iosched.c:5805 [inline]\nBUG: KASAN: slab-use-after-free in bfq_get_queue+0x25b0/0x2610 block/bfq-iosched.c:5889\nWrite of size 1 at addr ffff888123839eb8 by task kworker/0:1H/18595\n\nCPU: 0 PID: 18595 Comm: kworker/0:1H Tainted: G L 6.6.0-07439-gba2303cacfda #6\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014\nWorkqueue: kblockd blk_mq_requeue_work\nCall Trace:\n \n __dump_stack lib/dump_stack.c:88 [inline]\n dump_stack_lvl+0x91/0xf0 lib/dump_stack.c:106\n print_address_description mm/kasan/report.c:364 [inline]\n print_report+0x10d/0x610 mm/kasan/report.c:475\n kasan_report+0x8e/0xc0 mm/kasan/report.c:588\n bfq_do_early_stable_merge block/bfq-iosched.c:5692 [inline]\n bfq_do_or_sched_stable_merge block/bfq-iosched.c:5805 [inline]\n bfq_get_queue+0x25b0/0x2610 block/bfq-iosched.c:5889\n bfq_get_bfqq_handle_split+0x169/0x5d0 block/bfq-iosched.c:6757\n bfq_init_rq block/bfq-iosched.c:6876 [inline]\n bfq_insert_request block/bfq-iosched.c:6254 [inline]\n bfq_insert_requests+0x1112/0x5cf0 block/bfq-iosched.c:6304\n blk_mq_insert_request+0x290/0x8d0 block/blk-mq.c:2593\n blk_mq_requeue_work+0x6bc/0xa70 block/blk-mq.c:1502\n process_one_work kernel/workqueue.c:2627 [inline]\n process_scheduled_works+0x432/0x13f0 kernel/workqueue.c:2700\n worker_thread+0x6f2/0x1160 kernel/workqueue.c:2781\n kthread+0x33c/0x440 kernel/kthread.c:388\n ret_from_fork+0x4d/0x80 arch/x86/kernel/process.c:147\n ret_from_fork_asm+0x1b/0x30 arch/x86/entry/entry_64.S:305\n \n\nAllocated by task 20776:\n kasan_save_stack+0x20/0x40 mm/kasan/common.c:45\n kasan_set_track+0x25/0x30 mm/kasan/common.c:52\n __kasan_slab_alloc+0x87/0x90 mm/kasan/common.c:328\n kasan_slab_alloc include/linux/kasan.h:188 [inline]\n slab_post_alloc_hook mm/slab.h:763 [inline]\n slab_alloc_node mm/slub.c:3458 [inline]\n kmem_cache_alloc_node+0x1a4/0x6f0 mm/slub.c:3503\n ioc_create_icq block/blk-ioc.c:370 [inline]\n---truncated---" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/18ad4df091dd5d067d2faa8fce1180b79f7041a7", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/6d130db286ad0ea392c96ebb2551acf0d7308048", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/7faed2896d78e48ec96229e73b30b0af6c00a9aa", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/880692ee233ba63808182705b3333403413b58f5", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/8aa9de02a4be2e7006e636816ce19b0d667ceaa3", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/ddbdaad123254fb53e32480cb74a486a6868b1e0", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/e1277ae780cca4e69ef5468d4582dfd48f0b8320", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-477xx/CVE-2024-47707.json b/CVE-2024/CVE-2024-477xx/CVE-2024-47707.json new file mode 100644 index 00000000000..67ea2f9a410 --- /dev/null +++ b/CVE-2024/CVE-2024-477xx/CVE-2024-47707.json @@ -0,0 +1,37 @@ +{ + "id": "CVE-2024-47707", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2024-10-21T12:15:07.220", + "lastModified": "2024-10-21T12:15:07.220", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nipv6: avoid possible NULL deref in rt6_uncached_list_flush_dev()\n\nBlamed commit accidentally removed a check for rt->rt6i_idev being NULL,\nas spotted by syzbot:\n\nOops: general protection fault, probably for non-canonical address 0xdffffc0000000000: 0000 [#1] PREEMPT SMP KASAN PTI\nKASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007]\nCPU: 1 UID: 0 PID: 10998 Comm: syz-executor Not tainted 6.11.0-rc6-syzkaller-00208-g625403177711 #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024\n RIP: 0010:rt6_uncached_list_flush_dev net/ipv6/route.c:177 [inline]\n RIP: 0010:rt6_disable_ip+0x33e/0x7e0 net/ipv6/route.c:4914\nCode: 41 80 3c 04 00 74 0a e8 90 d0 9b f7 48 8b 7c 24 08 48 8b 07 48 89 44 24 10 4c 89 f0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <80> 3c 08 00 74 08 4c 89 f7 e8 64 d0 9b f7 48 8b 44 24 18 49 39 06\nRSP: 0018:ffffc900047374e0 EFLAGS: 00010246\nRAX: 0000000000000000 RBX: 1ffff1100fdf8f33 RCX: dffffc0000000000\nRDX: 0000000000000000 RSI: 0000000000000004 RDI: ffff88807efc78c0\nRBP: ffffc900047375d0 R08: 0000000000000003 R09: fffff520008e6e8c\nR10: dffffc0000000000 R11: fffff520008e6e8c R12: 1ffff1100fdf8f18\nR13: ffff88807efc7998 R14: 0000000000000000 R15: ffff88807efc7930\nFS: 0000000000000000(0000) GS:ffff8880b8900000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 0000000020002a80 CR3: 0000000022f62000 CR4: 00000000003506f0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nCall Trace:\n \n addrconf_ifdown+0x15d/0x1bd0 net/ipv6/addrconf.c:3856\n addrconf_notify+0x3cb/0x1020\n notifier_call_chain+0x19f/0x3e0 kernel/notifier.c:93\n call_netdevice_notifiers_extack net/core/dev.c:2032 [inline]\n call_netdevice_notifiers net/core/dev.c:2046 [inline]\n unregister_netdevice_many_notify+0xd81/0x1c40 net/core/dev.c:11352\n unregister_netdevice_many net/core/dev.c:11414 [inline]\n unregister_netdevice_queue+0x303/0x370 net/core/dev.c:11289\n unregister_netdevice include/linux/netdevice.h:3129 [inline]\n __tun_detach+0x6b9/0x1600 drivers/net/tun.c:685\n tun_detach drivers/net/tun.c:701 [inline]\n tun_chr_close+0x108/0x1b0 drivers/net/tun.c:3510\n __fput+0x24a/0x8a0 fs/file_table.c:422\n task_work_run+0x24f/0x310 kernel/task_work.c:228\n exit_task_work include/linux/task_work.h:40 [inline]\n do_exit+0xa2f/0x27f0 kernel/exit.c:882\n do_group_exit+0x207/0x2c0 kernel/exit.c:1031\n __do_sys_exit_group kernel/exit.c:1042 [inline]\n __se_sys_exit_group kernel/exit.c:1040 [inline]\n __x64_sys_exit_group+0x3f/0x40 kernel/exit.c:1040\n x64_sys_call+0x2634/0x2640 arch/x86/include/generated/asm/syscalls_64.h:232\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\nRIP: 0033:0x7f1acc77def9\nCode: Unable to access opcode bytes at 0x7f1acc77decf.\nRSP: 002b:00007ffeb26fa738 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7\nRAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f1acc77def9\nRDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000043\nRBP: 00007f1acc7dd508 R08: 00007ffeb26f84d7 R09: 0000000000000003\nR10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001\nR13: 0000000000000003 R14: 00000000ffffffff R15: 00007ffeb26fa8e0\n \nModules linked in:\n---[ end trace 0000000000000000 ]---\n RIP: 0010:rt6_uncached_list_flush_dev net/ipv6/route.c:177 [inline]\n RIP: 0010:rt6_disable_ip+0x33e/0x7e0 net/ipv6/route.c:4914\nCode: 41 80 3c 04 00 74 0a e8 90 d0 9b f7 48 8b 7c 24 08 48 8b 07 48 89 44 24 10 4c 89 f0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <80> 3c 08 00 74 08 4c 89 f7 e8 64 d0 9b f7 48 8b 44 24 18 49 39 06\nRSP: 0018:ffffc900047374e0 EFLAGS: 00010246\nRAX: 0000000000000000 RBX: 1ffff1100fdf8f33 RCX: dffffc0000000000\nRDX: 0000000000000000 RSI: 0000000000000004 RDI: ffff88807efc78c0\nR\n---truncated---" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/04ccecfa959d3b9ae7348780d8e379c6486176ac", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/08409e401622e2896b4313be9f781bde8a2a6a53", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/0ceb2f2b5c813f932d6e60d3feec5e7e713da783", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/9a0ddc73be37d19dff1ba08290af34e707d18e50", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/f2bd9635543ca41533b870f420872819f8331823", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-477xx/CVE-2024-47708.json b/CVE-2024/CVE-2024-477xx/CVE-2024-47708.json new file mode 100644 index 00000000000..e88d5549903 --- /dev/null +++ b/CVE-2024/CVE-2024-477xx/CVE-2024-47708.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-47708", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2024-10-21T12:15:07.313", + "lastModified": "2024-10-21T12:15:07.313", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetkit: Assign missing bpf_net_context\n\nDuring the introduction of struct bpf_net_context handling for\nXDP-redirect, the netkit driver has been missed, which also requires it\nbecause NETKIT_REDIRECT invokes skb_do_redirect() which is accessing the\nper-CPU variables. Otherwise we see the following crash:\n\n\tBUG: kernel NULL pointer dereference, address: 0000000000000038\n\tbpf_redirect()\n\tnetkit_xmit()\n\tdev_hard_start_xmit()\n\nSet the bpf_net_context before invoking netkit_xmit() program within the\nnetkit driver." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/157f29152b61ca41809dd7ead29f5733adeced19", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/182c6fed8c7f62cddce0126ec1fc0da2b700fb11", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-477xx/CVE-2024-47709.json b/CVE-2024/CVE-2024-477xx/CVE-2024-47709.json new file mode 100644 index 00000000000..73a29d4ba74 --- /dev/null +++ b/CVE-2024/CVE-2024-477xx/CVE-2024-47709.json @@ -0,0 +1,45 @@ +{ + "id": "CVE-2024-47709", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2024-10-21T12:15:07.397", + "lastModified": "2024-10-21T12:15:07.397", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ncan: bcm: Clear bo->bcm_proc_read after remove_proc_entry().\n\nsyzbot reported a warning in bcm_release(). [0]\n\nThe blamed change fixed another warning that is triggered when\nconnect() is issued again for a socket whose connect()ed device has\nbeen unregistered.\n\nHowever, if the socket is just close()d without the 2nd connect(), the\nremaining bo->bcm_proc_read triggers unnecessary remove_proc_entry()\nin bcm_release().\n\nLet's clear bo->bcm_proc_read after remove_proc_entry() in bcm_notify().\n\n[0]\nname '4986'\nWARNING: CPU: 0 PID: 5234 at fs/proc/generic.c:711 remove_proc_entry+0x2e7/0x5d0 fs/proc/generic.c:711\nModules linked in:\nCPU: 0 UID: 0 PID: 5234 Comm: syz-executor606 Not tainted 6.11.0-rc5-syzkaller-00178-g5517ae241919 #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024\nRIP: 0010:remove_proc_entry+0x2e7/0x5d0 fs/proc/generic.c:711\nCode: ff eb 05 e8 cb 1e 5e ff 48 8b 5c 24 10 48 c7 c7 e0 f7 aa 8e e8 2a 38 8e 09 90 48 c7 c7 60 3a 1b 8c 48 89 de e8 da 42 20 ff 90 <0f> 0b 90 90 48 8b 44 24 18 48 c7 44 24 40 0e 36 e0 45 49 c7 04 07\nRSP: 0018:ffffc9000345fa20 EFLAGS: 00010246\nRAX: 2a2d0aee2eb64600 RBX: ffff888032f1f548 RCX: ffff888029431e00\nRDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000\nRBP: ffffc9000345fb08 R08: ffffffff8155b2f2 R09: 1ffff1101710519a\nR10: dffffc0000000000 R11: ffffed101710519b R12: ffff888011d38640\nR13: 0000000000000004 R14: 0000000000000000 R15: dffffc0000000000\nFS: 0000000000000000(0000) GS:ffff8880b8800000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 00007fcfb52722f0 CR3: 000000000e734000 CR4: 00000000003506f0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nCall Trace:\n \n bcm_release+0x250/0x880 net/can/bcm.c:1578\n __sock_release net/socket.c:659 [inline]\n sock_close+0xbc/0x240 net/socket.c:1421\n __fput+0x24a/0x8a0 fs/file_table.c:422\n task_work_run+0x24f/0x310 kernel/task_work.c:228\n exit_task_work include/linux/task_work.h:40 [inline]\n do_exit+0xa2f/0x27f0 kernel/exit.c:882\n do_group_exit+0x207/0x2c0 kernel/exit.c:1031\n __do_sys_exit_group kernel/exit.c:1042 [inline]\n __se_sys_exit_group kernel/exit.c:1040 [inline]\n __x64_sys_exit_group+0x3f/0x40 kernel/exit.c:1040\n x64_sys_call+0x2634/0x2640 arch/x86/include/generated/asm/syscalls_64.h:232\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\nRIP: 0033:0x7fcfb51ee969\nCode: Unable to access opcode bytes at 0x7fcfb51ee93f.\nRSP: 002b:00007ffce0109ca8 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7\nRAX: ffffffffffffffda RBX: 0000000000000001 RCX: 00007fcfb51ee969\nRDX: 000000000000003c RSI: 00000000000000e7 RDI: 0000000000000001\nRBP: 00007fcfb526f3b0 R08: ffffffffffffffb8 R09: 0000555500000000\nR10: 0000555500000000 R11: 0000000000000246 R12: 00007fcfb526f3b0\nR13: 0000000000000000 R14: 00007fcfb5271ee0 R15: 00007fcfb51bf160\n " + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/5cc00913c1fdcab861c4e65fa20d1f1e1bbbf977", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/770b463264426cc3c167b1d44efa85f6a526ce5b", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/7a145d6ec2124bdb94bd6fc436b342ff6ddf2b70", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/94b0818fa63555a65f6ba107080659ea6bcca63e", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/9550baada4c8ef8cebefccc746384842820b4dff", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/b02ed2f01240b226570b4a19b5041d61f5125784", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/c3d941cc734e0c8dc486c062926d5249070af5e4", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-477xx/CVE-2024-47710.json b/CVE-2024/CVE-2024-477xx/CVE-2024-47710.json new file mode 100644 index 00000000000..bb4732867e2 --- /dev/null +++ b/CVE-2024/CVE-2024-477xx/CVE-2024-47710.json @@ -0,0 +1,45 @@ +{ + "id": "CVE-2024-47710", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2024-10-21T12:15:07.483", + "lastModified": "2024-10-21T12:15:07.483", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nsock_map: Add a cond_resched() in sock_hash_free()\n\nSeveral syzbot soft lockup reports all have in common sock_hash_free()\n\nIf a map with a large number of buckets is destroyed, we need to yield\nthe cpu when needed." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/04f62c012e0e4683e572b30baf6004ca0a3f6772", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/1a11a1a53255ddab8a903cdae01b9d3eb2c1a47b", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/80bd490ac0a3b662a489e17d8eedeb1e905a3d40", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/984648aac87a6a1c8fd61663bec3f7b61eafad5e", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/ae8c1b3e7353ad240b829eabac7ba2584b2c6bdc", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/b1339be951ad31947ae19bc25cb08769bf255100", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/cd10abf41bae55c9d2b93f34a516dbf52626bcb7", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-477xx/CVE-2024-47711.json b/CVE-2024/CVE-2024-477xx/CVE-2024-47711.json new file mode 100644 index 00000000000..c180e6f40c9 --- /dev/null +++ b/CVE-2024/CVE-2024-477xx/CVE-2024-47711.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-47711", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2024-10-21T12:15:07.563", + "lastModified": "2024-10-21T12:15:07.563", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\naf_unix: Don't return OOB skb in manage_oob().\n\nsyzbot reported use-after-free in unix_stream_recv_urg(). [0]\n\nThe scenario is\n\n 1. send(MSG_OOB)\n 2. recv(MSG_OOB)\n -> The consumed OOB remains in recv queue\n 3. send(MSG_OOB)\n 4. recv()\n -> manage_oob() returns the next skb of the consumed OOB\n -> This is also OOB, but unix_sk(sk)->oob_skb is not cleared\n 5. recv(MSG_OOB)\n -> unix_sk(sk)->oob_skb is used but already freed\n\nThe recent commit 8594d9b85c07 (\"af_unix: Don't call skb_get() for OOB\nskb.\") uncovered the issue.\n\nIf the OOB skb is consumed and the next skb is peeked in manage_oob(),\nwe still need to check if the skb is OOB.\n\nLet's do so by falling back to the following checks in manage_oob()\nand add the test case in selftest.\n\nNote that we need to add a similar check for SIOCATMARK.\n\n[0]:\nBUG: KASAN: slab-use-after-free in unix_stream_read_actor+0xa6/0xb0 net/unix/af_unix.c:2959\nRead of size 4 at addr ffff8880326abcc4 by task syz-executor178/5235\n\nCPU: 0 UID: 0 PID: 5235 Comm: syz-executor178 Not tainted 6.11.0-rc5-syzkaller-00742-gfbdaffe41adc #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024\nCall Trace:\n \n __dump_stack lib/dump_stack.c:93 [inline]\n dump_stack_lvl+0x241/0x360 lib/dump_stack.c:119\n print_address_description mm/kasan/report.c:377 [inline]\n print_report+0x169/0x550 mm/kasan/report.c:488\n kasan_report+0x143/0x180 mm/kasan/report.c:601\n unix_stream_read_actor+0xa6/0xb0 net/unix/af_unix.c:2959\n unix_stream_recv_urg+0x1df/0x320 net/unix/af_unix.c:2640\n unix_stream_read_generic+0x2456/0x2520 net/unix/af_unix.c:2778\n unix_stream_recvmsg+0x22b/0x2c0 net/unix/af_unix.c:2996\n sock_recvmsg_nosec net/socket.c:1046 [inline]\n sock_recvmsg+0x22f/0x280 net/socket.c:1068\n ____sys_recvmsg+0x1db/0x470 net/socket.c:2816\n ___sys_recvmsg net/socket.c:2858 [inline]\n __sys_recvmsg+0x2f0/0x3e0 net/socket.c:2888\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\nRIP: 0033:0x7f5360d6b4e9\nCode: 48 83 c4 28 c3 e8 37 17 00 00 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48\nRSP: 002b:00007fff29b3a458 EFLAGS: 00000246 ORIG_RAX: 000000000000002f\nRAX: ffffffffffffffda RBX: 00007fff29b3a638 RCX: 00007f5360d6b4e9\nRDX: 0000000000002001 RSI: 0000000020000640 RDI: 0000000000000003\nRBP: 00007f5360dde610 R08: 0000000000000000 R09: 0000000000000000\nR10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001\nR13: 00007fff29b3a628 R14: 0000000000000001 R15: 0000000000000001\n \n\nAllocated by task 5235:\n kasan_save_stack mm/kasan/common.c:47 [inline]\n kasan_save_track+0x3f/0x80 mm/kasan/common.c:68\n unpoison_slab_object mm/kasan/common.c:312 [inline]\n __kasan_slab_alloc+0x66/0x80 mm/kasan/common.c:338\n kasan_slab_alloc include/linux/kasan.h:201 [inline]\n slab_post_alloc_hook mm/slub.c:3988 [inline]\n slab_alloc_node mm/slub.c:4037 [inline]\n kmem_cache_alloc_node_noprof+0x16b/0x320 mm/slub.c:4080\n __alloc_skb+0x1c3/0x440 net/core/skbuff.c:667\n alloc_skb include/linux/skbuff.h:1320 [inline]\n alloc_skb_with_frags+0xc3/0x770 net/core/skbuff.c:6528\n sock_alloc_send_pskb+0x91a/0xa60 net/core/sock.c:2815\n sock_alloc_send_skb include/net/sock.h:1778 [inline]\n queue_oob+0x108/0x680 net/unix/af_unix.c:2198\n unix_stream_sendmsg+0xd24/0xf80 net/unix/af_unix.c:2351\n sock_sendmsg_nosec net/socket.c:730 [inline]\n __sock_sendmsg+0x221/0x270 net/socket.c:745\n ____sys_sendmsg+0x525/0x7d0 net/socket.c:2597\n ___sys_sendmsg net/socket.c:2651 [inline]\n __sys_sendmsg+0x2b0/0x3a0 net/socket.c:2680\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n\nFreed by task 5235:\n kasan_save_stack mm/kasan/common.c:47\n---truncated---" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/4a7f9a2591a923bdde4bd7eac33490b6ae3b257c", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/5aa57d9f2d5311f19434d95b2a81610aa263e23b", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-477xx/CVE-2024-47712.json b/CVE-2024/CVE-2024-477xx/CVE-2024-47712.json new file mode 100644 index 00000000000..64c997e4991 --- /dev/null +++ b/CVE-2024/CVE-2024-477xx/CVE-2024-47712.json @@ -0,0 +1,45 @@ +{ + "id": "CVE-2024-47712", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2024-10-21T12:15:07.640", + "lastModified": "2024-10-21T12:15:07.640", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: wilc1000: fix potential RCU dereference issue in wilc_parse_join_bss_param\n\nIn the `wilc_parse_join_bss_param` function, the TSF field of the `ies`\nstructure is accessed after the RCU read-side critical section is\nunlocked. According to RCU usage rules, this is illegal. Reusing this\npointer can lead to unpredictable behavior, including accessing memory\nthat has been updated or causing use-after-free issues.\n\nThis possible bug was identified using a static analysis tool developed\nby myself, specifically designed to detect RCU-related issues.\n\nTo address this, the TSF value is now stored in a local variable\n`ies_tsf` before the RCU lock is released. The `param->tsf_lo` field is\nthen assigned using this local variable, ensuring that the TSF value is\nsafely accessed." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/2f944e6255c2fc1c9bd9ee32f6b14ee0b2a51eb5", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/557418e1704605a81c9e26732449f71b1d40ba1e", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/6d7c6ae1efb1ff68bc01d79d94fdf0388f86cdd8", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/79510414a7626317f13cc9073244ab7a8deb3192", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/84398204c5df5aaf89453056cf0647cda9664d2b", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/b040b71d99ee5e17bb7a743dc01cbfcae8908ce1", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/bf090f4fe935294361eabd9dc5a949fdd77d3d1b", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-477xx/CVE-2024-47713.json b/CVE-2024/CVE-2024-477xx/CVE-2024-47713.json new file mode 100644 index 00000000000..a290de63edb --- /dev/null +++ b/CVE-2024/CVE-2024-477xx/CVE-2024-47713.json @@ -0,0 +1,45 @@ +{ + "id": "CVE-2024-47713", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2024-10-21T12:15:07.717", + "lastModified": "2024-10-21T12:15:07.717", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: mac80211: use two-phase skb reclamation in ieee80211_do_stop()\n\nSince '__dev_queue_xmit()' should be called with interrupts enabled,\nthe following backtrace:\n\nieee80211_do_stop()\n ...\n spin_lock_irqsave(&local->queue_stop_reason_lock, flags)\n ...\n ieee80211_free_txskb()\n ieee80211_report_used_skb()\n ieee80211_report_ack_skb()\n cfg80211_mgmt_tx_status_ext()\n nl80211_frame_tx_status()\n genlmsg_multicast_netns()\n genlmsg_multicast_netns_filtered()\n nlmsg_multicast_filtered()\n\t netlink_broadcast_filtered()\n\t do_one_broadcast()\n\t netlink_broadcast_deliver()\n\t __netlink_sendskb()\n\t netlink_deliver_tap()\n\t __netlink_deliver_tap_skb()\n\t dev_queue_xmit()\n\t __dev_queue_xmit() ; with IRQS disabled\n ...\n spin_unlock_irqrestore(&local->queue_stop_reason_lock, flags)\n\nissues the warning (as reported by syzbot reproducer):\n\nWARNING: CPU: 2 PID: 5128 at kernel/softirq.c:362 __local_bh_enable_ip+0xc3/0x120\n\nFix this by implementing a two-phase skb reclamation in\n'ieee80211_do_stop()', where actual work is performed\noutside of a section with interrupts disabled." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/058c9026ad79dc98572442fd4c7e9a36aba6f596", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/9d301de12da6e1bb069a9835c38359b8e8135121", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/acb53a716e492a02479345157c43f21edc8bc64b", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/ad4b7068b101fbbb4a9ca4b99b25eb051a9482ec", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/db5ca4b42ccfa42d2af7b335ff12578e57775c02", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/eab272972cffff9cd973b8e4055a8e81c64f7e6a", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/f232916fab67ca1c3425926df4a866e59ff26908", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-477xx/CVE-2024-47714.json b/CVE-2024/CVE-2024-477xx/CVE-2024-47714.json new file mode 100644 index 00000000000..bf7395c8329 --- /dev/null +++ b/CVE-2024/CVE-2024-477xx/CVE-2024-47714.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2024-47714", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2024-10-21T12:15:07.797", + "lastModified": "2024-10-21T12:15:07.797", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: mt76: mt7996: use hweight16 to get correct tx antenna\n\nThe chainmask is u16 so using hweight8 cannot get correct tx_ant.\nWithout this patch, the tx_ant of band 2 would be -1 and lead to the\nfollowing issue:\nBUG: KASAN: stack-out-of-bounds in mt7996_mcu_add_sta+0x12e0/0x16e0 [mt7996e]" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/33954930870c18ec549e4bca0eeff43e252cb740", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/50d87e3b70980abc090676b6b4703fcbd96221f9", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/8f51fc8a9e2fd96363d8ec3f4ee4b78dd64754e3", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/f98c3de92bb05dac4a4969df8a4595ed380b4604", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-477xx/CVE-2024-47715.json b/CVE-2024/CVE-2024-477xx/CVE-2024-47715.json new file mode 100644 index 00000000000..81dd2d33423 --- /dev/null +++ b/CVE-2024/CVE-2024-477xx/CVE-2024-47715.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2024-47715", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2024-10-21T12:15:07.870", + "lastModified": "2024-10-21T12:15:07.870", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: mt76: mt7915: fix oops on non-dbdc mt7986\n\nmt7915_band_config() sets band_idx = 1 on the main phy for mt7986\nwith MT7975_ONE_ADIE or MT7976_ONE_ADIE.\n\nCommit 0335c034e726 (\"wifi: mt76: fix race condition related to\nchecking tx queue fill status\") introduced a dereference of the\nphys array indirectly indexed by band_idx via wcid->phy_idx in\nmt76_wcid_cleanup(). This caused the following Oops on affected\nmt7986 devices:\n\n Unable to handle kernel read from unreadable memory at virtual address 0000000000000024\n Mem abort info:\n ESR = 0x0000000096000005\n EC = 0x25: DABT (current EL), IL = 32 bits\n SET = 0, FnV = 0\n EA = 0, S1PTW = 0\n FSC = 0x05: level 1 translation fault\n Data abort info:\n ISV = 0, ISS = 0x00000005\n CM = 0, WnR = 0\n user pgtable: 4k pages, 39-bit VAs, pgdp=0000000042545000\n [0000000000000024] pgd=0000000000000000, p4d=0000000000000000, pud=0000000000000000\n Internal error: Oops: 0000000096000005 [#1] SMP\n Modules linked in: ... mt7915e mt76_connac_lib mt76 mac80211 cfg80211 ...\n CPU: 2 PID: 1631 Comm: hostapd Not tainted 5.15.150 #0\n Hardware name: ZyXEL EX5700 (Telenor) (DT)\n pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n pc : mt76_wcid_cleanup+0x84/0x22c [mt76]\n lr : mt76_wcid_cleanup+0x64/0x22c [mt76]\n sp : ffffffc00a803700\n x29: ffffffc00a803700 x28: ffffff80008f7300 x27: ffffff80003f3c00\n x26: ffffff80000a7880 x25: ffffffc008c26e00 x24: 0000000000000001\n x23: ffffffc000a68114 x22: 0000000000000000 x21: ffffff8004172cc8\n x20: ffffffc00a803748 x19: ffffff8004152020 x18: 0000000000000000\n x17: 00000000000017c0 x16: ffffffc008ef5000 x15: 0000000000000be0\n x14: ffffff8004172e28 x13: ffffff8004172e28 x12: 0000000000000000\n x11: 0000000000000000 x10: ffffff8004172e30 x9 : ffffff8004172e28\n x8 : 0000000000000000 x7 : ffffff8004156020 x6 : 0000000000000000\n x5 : 0000000000000031 x4 : 0000000000000000 x3 : 0000000000000001\n x2 : 0000000000000000 x1 : ffffff80008f7300 x0 : 0000000000000024\n Call trace:\n mt76_wcid_cleanup+0x84/0x22c [mt76]\n __mt76_sta_remove+0x70/0xbc [mt76]\n mt76_sta_state+0x8c/0x1a4 [mt76]\n mt7915_eeprom_get_power_delta+0x11e4/0x23a0 [mt7915e]\n drv_sta_state+0x144/0x274 [mac80211]\n sta_info_move_state+0x1cc/0x2a4 [mac80211]\n sta_set_sinfo+0xaf8/0xc24 [mac80211]\n sta_info_destroy_addr_bss+0x4c/0x6c [mac80211]\n\n ieee80211_color_change_finish+0x1c08/0x1e70 [mac80211]\n cfg80211_check_station_change+0x1360/0x4710 [cfg80211]\n genl_family_rcv_msg_doit+0xb4/0x110\n genl_rcv_msg+0xd0/0x1bc\n netlink_rcv_skb+0x58/0x120\n genl_rcv+0x34/0x50\n netlink_unicast+0x1f0/0x2ec\n netlink_sendmsg+0x198/0x3d0\n ____sys_sendmsg+0x1b0/0x210\n ___sys_sendmsg+0x80/0xf0\n __sys_sendmsg+0x44/0xa0\n __arm64_sys_sendmsg+0x20/0x30\n invoke_syscall.constprop.0+0x4c/0xe0\n do_el0_svc+0x40/0xd0\n el0_svc+0x14/0x4c\n el0t_64_sync_handler+0x100/0x110\n el0t_64_sync+0x15c/0x160\n Code: d2800002 910092c0 52800023 f9800011 (885f7c01)\n ---[ end trace 7e42dd9a39ed2281 ]---\n\nFix by using mt76_dev_phy() which will map band_idx to the correct phy\nfor all hardware combinations." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/7c128f3ff0be5802aef66f332e4bba6afe98735e", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/818dd118f4a997f8b4fe9c010b22402d410a2424", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/862bf7cbd772c2bad570ef0c5b5556a1330656dd", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/a94d2bd111b39f0c2c7fcbfbf8276ab98c3b8353", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-477xx/CVE-2024-47716.json b/CVE-2024/CVE-2024-477xx/CVE-2024-47716.json new file mode 100644 index 00000000000..dd6c8880957 --- /dev/null +++ b/CVE-2024/CVE-2024-477xx/CVE-2024-47716.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2024-47716", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2024-10-21T12:15:07.943", + "lastModified": "2024-10-21T12:15:07.943", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nARM: 9410/1: vfp: Use asm volatile in fmrx/fmxr macros\n\nFloating point instructions in userspace can crash some arm kernels\nbuilt with clang/LLD 17.0.6:\n\n BUG: unsupported FP instruction in kernel mode\n FPEXC == 0xc0000780\n Internal error: Oops - undefined instruction: 0 [#1] ARM\n CPU: 0 PID: 196 Comm: vfp-reproducer Not tainted 6.10.0 #1\n Hardware name: BCM2835\n PC is at vfp_support_entry+0xc8/0x2cc\n LR is at do_undefinstr+0xa8/0x250\n pc : [] lr : [] psr: a0000013\n sp : dc8d1f68 ip : 60000013 fp : bedea19c\n r10: ec532b17 r9 : 00000010 r8 : 0044766c\n r7 : c0000780 r6 : ec532b17 r5 : c1c13800 r4 : dc8d1fb0\n r3 : c10072c4 r2 : c0101c88 r1 : ec532b17 r0 : 0044766c\n Flags: NzCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment none\n Control: 00c5387d Table: 0251c008 DAC: 00000051\n Register r0 information: non-paged memory\n Register r1 information: vmalloc memory\n Register r2 information: non-slab/vmalloc memory\n Register r3 information: non-slab/vmalloc memory\n Register r4 information: 2-page vmalloc region\n Register r5 information: slab kmalloc-cg-2k\n Register r6 information: vmalloc memory\n Register r7 information: non-slab/vmalloc memory\n Register r8 information: non-paged memory\n Register r9 information: zero-size pointer\n Register r10 information: vmalloc memory\n Register r11 information: non-paged memory\n Register r12 information: non-paged memory\n Process vfp-reproducer (pid: 196, stack limit = 0x61aaaf8b)\n Stack: (0xdc8d1f68 to 0xdc8d2000)\n 1f60: 0000081f b6f69300 0000000f c10073f4 c10072c4 dc8d1fb0\n 1f80: ec532b17 0c532b17 0044766c b6f9ccd8 00000000 c010a80c 00447670 60000010\n 1fa0: ffffffff c1c13800 00c5387d c0100f10 b6f68af8 00448fc0 00000000 bedea188\n 1fc0: bedea314 00000001 00448ebc b6f9d000 00447608 b6f9ccd8 00000000 bedea19c\n 1fe0: bede9198 bedea188 b6e1061c 0044766c 60000010 ffffffff 00000000 00000000\n Call trace:\n [] (vfp_support_entry) from [] (do_undefinstr+0xa8/0x250)\n [] (do_undefinstr) from [] (__und_usr+0x70/0x80)\n Exception stack(0xdc8d1fb0 to 0xdc8d1ff8)\n 1fa0: b6f68af8 00448fc0 00000000 bedea188\n 1fc0: bedea314 00000001 00448ebc b6f9d000 00447608 b6f9ccd8 00000000 bedea19c\n 1fe0: bede9198 bedea188 b6e1061c 0044766c 60000010 ffffffff\n Code: 0a000061 e3877202 e594003c e3a09010 (eef16a10)\n ---[ end trace 0000000000000000 ]---\n Kernel panic - not syncing: Fatal exception in interrupt\n ---[ end Kernel panic - not syncing: Fatal exception in interrupt ]---\n\nThis is a minimal userspace reproducer on a Raspberry Pi Zero W:\n\n #include \n #include \n\n int main(void)\n {\n double v = 1.0;\n printf(\"%fn\", NAN + *(volatile double *)&v);\n return 0;\n }\n\nAnother way to consistently trigger the oops is:\n\n calvin@raspberry-pi-zero-w ~$ python -c \"import json\"\n\nThe bug reproduces only when the kernel is built with DYNAMIC_DEBUG=n,\nbecause the pr_debug() calls act as barriers even when not activated.\n\nThis is the output from the same kernel source built with the same\ncompiler and DYNAMIC_DEBUG=y, where the userspace reproducer works as\nexpected:\n\n VFP: bounce: trigger ec532b17 fpexc c0000780\n VFP: emulate: INST=0xee377b06 SCR=0x00000000\n VFP: bounce: trigger eef1fa10 fpexc c0000780\n VFP: emulate: INST=0xeeb40b40 SCR=0x00000000\n VFP: raising exceptions 30000000\n\n calvin@raspberry-pi-zero-w ~$ ./vfp-reproducer\n nan\n\nCrudely grepping for vmsr/vmrs instructions in the otherwise nearly\nidential text for vfp_support_entry() makes the problem obvious:\n\n vmlinux.llvm.good [0xc0101cb8] <+48>: vmrs r7, fpexc\n vmlinux.llvm.good [0xc0101cd8] <+80>: vmsr fpexc, r0\n vmlinux.llvm.good [0xc0101d20\n---truncated---" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/39caf610a63786b3b0ef3348ac015edc19827d6a", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/89a906dfa8c3b21b3e5360f73c49234ac1eb885b", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/9fc60f2bdd43e758bdf0305c0fc83221419ddb3f", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/cd595d87e5fdd2fc09ea69359aa85e7f12f4b97b", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-477xx/CVE-2024-47717.json b/CVE-2024/CVE-2024-477xx/CVE-2024-47717.json new file mode 100644 index 00000000000..1e4158b954c --- /dev/null +++ b/CVE-2024/CVE-2024-477xx/CVE-2024-47717.json @@ -0,0 +1,29 @@ +{ + "id": "CVE-2024-47717", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2024-10-21T12:15:08.020", + "lastModified": "2024-10-21T12:15:08.020", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nRISC-V: KVM: Don't zero-out PMU snapshot area before freeing data\n\nWith the latest Linux-6.11-rc3, the below NULL pointer crash is observed\nwhen SBI PMU snapshot is enabled for the guest and the guest is forcefully\npowered-off.\n\n Unable to handle kernel NULL pointer dereference at virtual address 0000000000000508\n Oops [#1]\n Modules linked in: kvm\n CPU: 0 UID: 0 PID: 61 Comm: term-poll Not tainted 6.11.0-rc3-00018-g44d7178dd77a #3\n Hardware name: riscv-virtio,qemu (DT)\n epc : __kvm_write_guest_page+0x94/0xa6 [kvm]\n ra : __kvm_write_guest_page+0x54/0xa6 [kvm]\n epc : ffffffff01590e98 ra : ffffffff01590e58 sp : ffff8f80001f39b0\n gp : ffffffff81512a60 tp : ffffaf80024872c0 t0 : ffffaf800247e000\n t1 : 00000000000007e0 t2 : 0000000000000000 s0 : ffff8f80001f39f0\n s1 : 00007fff89ac4000 a0 : ffffffff015dd7e8 a1 : 0000000000000086\n a2 : 0000000000000000 a3 : ffffaf8000000000 a4 : ffffaf80024882c0\n a5 : 0000000000000000 a6 : ffffaf800328d780 a7 : 00000000000001cc\n s2 : ffffaf800197bd00 s3 : 00000000000828c4 s4 : ffffaf800248c000\n s5 : ffffaf800247d000 s6 : 0000000000001000 s7 : 0000000000001000\n s8 : 0000000000000000 s9 : 00007fff861fd500 s10: 0000000000000001\n s11: 0000000000800000 t3 : 00000000000004d3 t4 : 00000000000004d3\n t5 : ffffffff814126e0 t6 : ffffffff81412700\n status: 0000000200000120 badaddr: 0000000000000508 cause: 000000000000000d\n [] __kvm_write_guest_page+0x94/0xa6 [kvm]\n [] kvm_vcpu_write_guest+0x56/0x90 [kvm]\n [] kvm_pmu_clear_snapshot_area+0x42/0x7e [kvm]\n [] kvm_riscv_vcpu_pmu_deinit.part.0+0xe0/0x14e [kvm]\n [] kvm_riscv_vcpu_pmu_deinit+0x1a/0x24 [kvm]\n [] kvm_arch_vcpu_destroy+0x28/0x4c [kvm]\n [] kvm_destroy_vcpus+0x5a/0xda [kvm]\n [] kvm_arch_destroy_vm+0x14/0x28 [kvm]\n [] kvm_destroy_vm+0x168/0x2a0 [kvm]\n [] kvm_put_kvm+0x3c/0x58 [kvm]\n [] kvm_vm_release+0x22/0x2e [kvm]\n\nClearly, the kvm_vcpu_write_guest() function is crashing because it is\nbeing called from kvm_pmu_clear_snapshot_area() upon guest tear down.\n\nTo address the above issue, simplify the kvm_pmu_clear_snapshot_area() to\nnot zero-out PMU snapshot area from kvm_pmu_clear_snapshot_area() because\nthe guest is anyway being tore down.\n\nThe kvm_pmu_clear_snapshot_area() is also called when guest changes\nPMU snapshot area of a VCPU but even in this case the previous PMU\nsnaphsot area must not be zeroed-out because the guest might have\nreclaimed the pervious PMU snapshot area for some other purpose." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/47d40d93292d9cff8dabb735bed83d930fa03950", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/6d0a5dcfc78bd18f2abb9641f83380135494559b", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/81aa95fd5bd14ff49617f07fa79a8d1f1cf2ce9a", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-477xx/CVE-2024-47718.json b/CVE-2024/CVE-2024-477xx/CVE-2024-47718.json new file mode 100644 index 00000000000..d9a6c2037c0 --- /dev/null +++ b/CVE-2024/CVE-2024-477xx/CVE-2024-47718.json @@ -0,0 +1,45 @@ +{ + "id": "CVE-2024-47718", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2024-10-21T12:15:08.090", + "lastModified": "2024-10-21T12:15:08.090", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: rtw88: always wait for both firmware loading attempts\n\nIn 'rtw_wait_firmware_completion()', always wait for both (regular and\nwowlan) firmware loading attempts. Otherwise if 'rtw_usb_intf_init()'\nhas failed in 'rtw_usb_probe()', 'rtw_usb_disconnect()' may issue\n'ieee80211_free_hw()' when one of 'rtw_load_firmware_cb()' (usually\nthe wowlan one) is still in progress, causing UAF detected by KASAN." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/0e735a4c6137262bcefe45bb52fde7b1f5fc6c4d", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/1b8178a2ae272256ea0dc4f940320a81003535e2", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/7887ad11995a4142671cc49146db536f923c8568", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/9432185540bafd42b7bfac6e6ef2f0a0fb4be447", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/a0c1e2da652cf70825739bc12d49ea15805690bf", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/ceaab3fb64d6a5426a3db8f87f3e5757964f2532", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/e9a78d9417e167410d6fb83c4e908b077ad8ba6d", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-477xx/CVE-2024-47719.json b/CVE-2024/CVE-2024-477xx/CVE-2024-47719.json new file mode 100644 index 00000000000..c2a6cef0006 --- /dev/null +++ b/CVE-2024/CVE-2024-477xx/CVE-2024-47719.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2024-47719", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2024-10-21T12:15:08.167", + "lastModified": "2024-10-21T12:15:08.167", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\niommufd: Protect against overflow of ALIGN() during iova allocation\n\nUserspace can supply an iova and uptr such that the target iova alignment\nbecomes really big and ALIGN() overflows which corrupts the selected area\nrange during allocation. CONFIG_IOMMUFD_TEST can detect this:\n\n WARNING: CPU: 1 PID: 5092 at drivers/iommu/iommufd/io_pagetable.c:268 iopt_alloc_area_pages drivers/iommu/iommufd/io_pagetable.c:268 [inline]\n WARNING: CPU: 1 PID: 5092 at drivers/iommu/iommufd/io_pagetable.c:268 iopt_map_pages+0xf95/0x1050 drivers/iommu/iommufd/io_pagetable.c:352\n Modules linked in:\n CPU: 1 PID: 5092 Comm: syz-executor294 Not tainted 6.10.0-rc5-syzkaller-00294-g3ffea9a7a6f7 #0\n Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024\n RIP: 0010:iopt_alloc_area_pages drivers/iommu/iommufd/io_pagetable.c:268 [inline]\n RIP: 0010:iopt_map_pages+0xf95/0x1050 drivers/iommu/iommufd/io_pagetable.c:352\n Code: fc e9 a4 f3 ff ff e8 1a 8b 4c fc 41 be e4 ff ff ff e9 8a f3 ff ff e8 0a 8b 4c fc 90 0f 0b 90 e9 37 f5 ff ff e8 fc 8a 4c fc 90 <0f> 0b 90 e9 68 f3 ff ff 48 c7 c1 ec 82 ad 8f 80 e1 07 80 c1 03 38\n RSP: 0018:ffffc90003ebf9e0 EFLAGS: 00010293\n RAX: ffffffff85499fa4 RBX: 00000000ffffffef RCX: ffff888079b49e00\n RDX: 0000000000000000 RSI: 00000000ffffffef RDI: 0000000000000000\n RBP: ffffc90003ebfc50 R08: ffffffff85499b30 R09: ffffffff85499942\n R10: 0000000000000002 R11: ffff888079b49e00 R12: ffff8880228e0010\n R13: 0000000000000000 R14: 1ffff920007d7f68 R15: ffffc90003ebfd00\n FS: 000055557d760380(0000) GS:ffff8880b9500000(0000) knlGS:0000000000000000\n CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n CR2: 00000000005fdeb8 CR3: 000000007404a000 CR4: 00000000003506f0\n DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n Call Trace:\n \n iommufd_ioas_copy+0x610/0x7b0 drivers/iommu/iommufd/ioas.c:274\n iommufd_fops_ioctl+0x4d9/0x5a0 drivers/iommu/iommufd/main.c:421\n vfs_ioctl fs/ioctl.c:51 [inline]\n __do_sys_ioctl fs/ioctl.c:907 [inline]\n __se_sys_ioctl+0xfc/0x170 fs/ioctl.c:893\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n\nCap the automatic alignment to the huge page size, which is probably a\nbetter idea overall. Huge automatic alignments can fragment and chew up\nthe available IOVA space without any reason." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/72b78287ce92802e8ba678181a34b84ae844a112", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/8f6887349b2f829a4121c518aeb064fc922714e4", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/a6e9f9fd14772c0b23c6d1d7002d98f9d27cb1f6", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/cd6dd564ae7d99967ef50078216929418160b30e", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-477xx/CVE-2024-47720.json b/CVE-2024/CVE-2024-477xx/CVE-2024-47720.json new file mode 100644 index 00000000000..bd06cd9c427 --- /dev/null +++ b/CVE-2024/CVE-2024-477xx/CVE-2024-47720.json @@ -0,0 +1,41 @@ +{ + "id": "CVE-2024-47720", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2024-10-21T12:15:08.240", + "lastModified": "2024-10-21T12:15:08.240", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: Add null check for set_output_gamma in dcn30_set_output_transfer_func\n\nThis commit adds a null check for the set_output_gamma function pointer\nin the dcn30_set_output_transfer_func function. Previously,\nset_output_gamma was being checked for nullity at line 386, but then it\nwas being dereferenced without any nullity check at line 401. This\ncould potentially lead to a null pointer dereference error if\nset_output_gamma is indeed null.\n\nTo fix this, we now ensure that set_output_gamma is not null before\ndereferencing it. We do this by adding a nullity check for\nset_output_gamma before the call to set_output_gamma at line 401. If\nset_output_gamma is null, we log an error message and do not call the\nfunction.\n\nThis fix prevents a potential null pointer dereference error.\n\ndrivers/gpu/drm/amd/amdgpu/../display/dc/hwss/dcn30/dcn30_hwseq.c:401 dcn30_set_output_transfer_func()\nerror: we previously assumed 'mpc->funcs->set_output_gamma' could be null (see line 386)\n\ndrivers/gpu/drm/amd/amdgpu/../display/dc/hwss/dcn30/dcn30_hwseq.c\n 373 bool dcn30_set_output_transfer_func(struct dc *dc,\n 374 struct pipe_ctx *pipe_ctx,\n 375 const struct dc_stream_state *stream)\n 376 {\n 377 int mpcc_id = pipe_ctx->plane_res.hubp->inst;\n 378 struct mpc *mpc = pipe_ctx->stream_res.opp->ctx->dc->res_pool->mpc;\n 379 const struct pwl_params *params = NULL;\n 380 bool ret = false;\n 381\n 382 /* program OGAM or 3DLUT only for the top pipe*/\n 383 if (pipe_ctx->top_pipe == NULL) {\n 384 /*program rmu shaper and 3dlut in MPC*/\n 385 ret = dcn30_set_mpc_shaper_3dlut(pipe_ctx, stream);\n 386 if (ret == false && mpc->funcs->set_output_gamma) {\n ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ If this is NULL\n\n 387 if (stream->out_transfer_func.type == TF_TYPE_HWPWL)\n 388 params = &stream->out_transfer_func.pwl;\n 389 else if (pipe_ctx->stream->out_transfer_func.type ==\n 390 TF_TYPE_DISTRIBUTED_POINTS &&\n 391 cm3_helper_translate_curve_to_hw_format(\n 392 &stream->out_transfer_func,\n 393 &mpc->blender_params, false))\n 394 params = &mpc->blender_params;\n 395 /* there are no ROM LUTs in OUTGAM */\n 396 if (stream->out_transfer_func.type == TF_TYPE_PREDEFINED)\n 397 BREAK_TO_DEBUGGER();\n 398 }\n 399 }\n 400\n--> 401 mpc->funcs->set_output_gamma(mpc, mpcc_id, params);\n ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Then it will crash\n\n 402 return ret;\n 403 }" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/08ae395ea22fb3d9b318c8bde28c0dfd2f5fa4d2", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/44948d3cb943602ba4a0b5ed3c91ae0525838fb1", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/64886a4e6f1dce843c0889505cf0673b5211e16a", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/72ee32d0907364104fbcf4f68dd5ae63cd8eae9e", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/84edd5a3f5fa6aafa4afcaf9f101f46426c620c9", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/ddf9ff244d704e1903533f7be377615ed34b83e7", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-477xx/CVE-2024-47721.json b/CVE-2024/CVE-2024-477xx/CVE-2024-47721.json new file mode 100644 index 00000000000..db01a05b028 --- /dev/null +++ b/CVE-2024/CVE-2024-477xx/CVE-2024-47721.json @@ -0,0 +1,29 @@ +{ + "id": "CVE-2024-47721", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2024-10-21T12:15:08.313", + "lastModified": "2024-10-21T12:15:08.313", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: rtw89: remove unused C2H event ID RTW89_MAC_C2H_FUNC_READ_WOW_CAM to prevent out-of-bounds reading\n\nThe handler of firmware C2H event RTW89_MAC_C2H_FUNC_READ_WOW_CAM isn't\nimplemented, but driver expects number of handlers is\nNUM_OF_RTW89_MAC_C2H_FUNC_WOW causing out-of-bounds access. Fix it by\nremoving ID.\n\nAddresses-Coverity-ID: 1598775 (\"Out-of-bounds read\")" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/10463308b9454f534d03300cf679bc4b3d078f46", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/2c9c2d1a20916589497a7facbea3e82cabec4ab8", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/56310ddb50b190b3390fdc974aec455d0a516bd2", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-477xx/CVE-2024-47722.json b/CVE-2024/CVE-2024-477xx/CVE-2024-47722.json new file mode 100644 index 00000000000..8b764cf39cb --- /dev/null +++ b/CVE-2024/CVE-2024-477xx/CVE-2024-47722.json @@ -0,0 +1,16 @@ +{ + "id": "CVE-2024-47722", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2024-10-21T13:15:02.360", + "lastModified": "2024-10-21T13:15:02.360", + "vulnStatus": "Rejected", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority." + } + ], + "metrics": {}, + "references": [] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-477xx/CVE-2024-47723.json b/CVE-2024/CVE-2024-477xx/CVE-2024-47723.json new file mode 100644 index 00000000000..847d3cc1fae --- /dev/null +++ b/CVE-2024/CVE-2024-477xx/CVE-2024-47723.json @@ -0,0 +1,45 @@ +{ + "id": "CVE-2024-47723", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2024-10-21T13:15:02.503", + "lastModified": "2024-10-21T13:15:02.503", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\njfs: fix out-of-bounds in dbNextAG() and diAlloc()\n\nIn dbNextAG() , there is no check for the case where bmp->db_numag is\ngreater or same than MAXAG due to a polluted image, which causes an\nout-of-bounds. Therefore, a bounds check should be added in dbMount().\n\nAnd in dbNextAG(), a check for the case where agpref is greater than\nbmp->db_numag should be added, so an out-of-bounds exception should be\nprevented.\n\nAdditionally, a check for the case where agno is greater or same than\nMAXAG should be added in diAlloc() to prevent out-of-bounds." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/0338e66cba272351ca9d7d03f3628e390e70963b", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/128d5cfdcf844cb690c9295a3a1c1114c21fc15a", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/6ce8b6ab44a8b5918c0ee373d4ad19d19017931b", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/96855f40e152989c9e7c20c4691ace5581098acc", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/c1ba4b8ca799ff1d99d01f37d7ccb7d5ba5533d2", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/e63866a475562810500ea7f784099bfe341e761a", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/ead82533278502428883085a787d5a00f15e5eb9", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-477xx/CVE-2024-47724.json b/CVE-2024/CVE-2024-477xx/CVE-2024-47724.json new file mode 100644 index 00000000000..9562596571e --- /dev/null +++ b/CVE-2024/CVE-2024-477xx/CVE-2024-47724.json @@ -0,0 +1,29 @@ +{ + "id": "CVE-2024-47724", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2024-10-21T13:15:02.590", + "lastModified": "2024-10-21T13:15:02.590", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: ath11k: use work queue to process beacon tx event\n\nCommit 3a415daa3e8b (\"wifi: ath11k: add P2P IE in beacon template\")\nfrom Feb 28, 2024 (linux-next), leads to the following Smatch static\nchecker warning:\n\ndrivers/net/wireless/ath/ath11k/wmi.c:1742 ath11k_wmi_p2p_go_bcn_ie()\nwarn: sleeping in atomic context\n\nThe reason is that ath11k_bcn_tx_status_event() will directly call might\nsleep function ath11k_wmi_cmd_send() during RCU read-side critical\nsections. The call trace is like:\n\nath11k_bcn_tx_status_event()\n-> rcu_read_lock()\n-> ath11k_mac_bcn_tx_event()\n\t-> ath11k_mac_setup_bcn_tmpl()\n\t\u2026\u2026\n\t\t-> ath11k_wmi_bcn_tmpl()\n\t\t\t-> ath11k_wmi_cmd_send()\n-> rcu_read_unlock()\n\nCommit 886433a98425 (\"ath11k: add support for BSS color change\") added the\nath11k_mac_bcn_tx_event(), commit 01e782c89108 (\"ath11k: fix warning\nof RCU usage for ath11k_mac_get_arvif_by_vdev_id()\") added the RCU lock\nto avoid warning but also introduced this BUG.\n\nUse work queue to avoid directly calling ath11k_mac_bcn_tx_event()\nduring RCU critical sections. No need to worry about the deletion of vif\nbecause cancel_work_sync() will drop the work if it doesn't start or\nblock vif deletion until the running work is done.\n\nTested-on: WCN6855 hw2.0 PCI WLAN.HSP.1.1-03125-QCAHSPSWPL_V1_V2_SILICONZ_LITE-3.6510.30" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/177b49dbf9c1d8f9f25a22ffafa416fc2c8aa6a3", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/6db232905e094e64abff1f18249905d068285e09", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/dbd51da69dda1137723b8f66460bf99a9dac8dd2", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-477xx/CVE-2024-47725.json b/CVE-2024/CVE-2024-477xx/CVE-2024-47725.json new file mode 100644 index 00000000000..501f7290b39 --- /dev/null +++ b/CVE-2024/CVE-2024-477xx/CVE-2024-47725.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2024-47725", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2024-10-21T13:15:02.673", + "lastModified": "2024-10-21T13:15:02.673", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndm-verity: restart or panic on an I/O error\n\nMaxim Suhanov reported that dm-verity doesn't crash if an I/O error\nhappens. In theory, this could be used to subvert security, because an\nattacker can create sectors that return error with the Write Uncorrectable\ncommand. Some programs may misbehave if they have to deal with EIO.\n\nThis commit fixes dm-verity, so that if \"panic_on_corruption\" or\n\"restart_on_corruption\" was specified and an I/O error happens, the\nmachine will panic or restart.\n\nThis commit also changes kernel_restart to emergency_restart -\nkernel_restart calls reboot notifiers and these reboot notifiers may wait\nfor the bio that failed. emergency_restart doesn't call the notifiers." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/338b32a232bbee39e52dd1486cbc0c9f458d4d69", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/b332bcca59143cfdd000957f8b78c28dd2ac1da4", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/cada2646b7483cce370eb3b046659df31d9d34d1", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/e6a3531dd542cb127c8de32ab1e54a48ae19962b", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-477xx/CVE-2024-47726.json b/CVE-2024/CVE-2024-477xx/CVE-2024-47726.json new file mode 100644 index 00000000000..912614d1688 --- /dev/null +++ b/CVE-2024/CVE-2024-477xx/CVE-2024-47726.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-47726", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2024-10-21T13:15:02.767", + "lastModified": "2024-10-21T13:15:02.767", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nf2fs: fix to wait dio completion\n\nIt should wait all existing dio write IOs before block removal,\notherwise, previous direct write IO may overwrite data in the\nblock which may be reused by other inode." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/96cfeb0389530ae32ade8a48ae3ae1ac3b6c009d", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/e3db757ff9b7101ae68650ac5f6dd5743b68164e", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-477xx/CVE-2024-47727.json b/CVE-2024/CVE-2024-477xx/CVE-2024-47727.json new file mode 100644 index 00000000000..9fa3210f9f3 --- /dev/null +++ b/CVE-2024/CVE-2024-477xx/CVE-2024-47727.json @@ -0,0 +1,37 @@ +{ + "id": "CVE-2024-47727", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2024-10-21T13:15:02.883", + "lastModified": "2024-10-21T13:15:02.883", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nx86/tdx: Fix \"in-kernel MMIO\" check\n\nTDX only supports kernel-initiated MMIO operations. The handle_mmio()\nfunction checks if the #VE exception occurred in the kernel and rejects\nthe operation if it did not.\n\nHowever, userspace can deceive the kernel into performing MMIO on its\nbehalf. For example, if userspace can point a syscall to an MMIO address,\nsyscall does get_user() or put_user() on it, triggering MMIO #VE. The\nkernel will treat the #VE as in-kernel MMIO.\n\nEnsure that the target MMIO address is within the kernel before decoding\ninstruction." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/18ecd5b74682839e7cdafb7cd1ec106df7baa18c", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/25703a3c980e21548774eea8c8a87a75c5c8f58c", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/4c0c5dcb5471de5fc8f0a1c4980e5815339e1cee", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/bca2e29f7e26ce7c3522f8b324c0bd85612f68e3", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/d4fc4d01471528da8a9797a065982e05090e1d81", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-477xx/CVE-2024-47728.json b/CVE-2024/CVE-2024-477xx/CVE-2024-47728.json new file mode 100644 index 00000000000..97a1103a845 --- /dev/null +++ b/CVE-2024/CVE-2024-477xx/CVE-2024-47728.json @@ -0,0 +1,37 @@ +{ + "id": "CVE-2024-47728", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2024-10-21T13:15:02.980", + "lastModified": "2024-10-21T13:15:02.980", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Zero former ARG_PTR_TO_{LONG,INT} args in case of error\n\nFor all non-tracing helpers which formerly had ARG_PTR_TO_{LONG,INT} as input\narguments, zero the value for the case of an error as otherwise it could leak\nmemory. For tracing, it is not needed given CAP_PERFMON can already read all\nkernel memory anyway hence bpf_get_func_arg() and bpf_get_func_ret() is skipped\nin here.\n\nAlso, the MTU helpers mtu_len pointer value is being written but also read.\nTechnically, the MEM_UNINIT should not be there in order to always force init.\nRemoving MEM_UNINIT needs more verifier rework though: MEM_UNINIT right now\nimplies two things actually: i) write into memory, ii) memory does not have\nto be initialized. If we lift MEM_UNINIT, it then becomes: i) read into memory,\nii) memory must be initialized. This means that for bpf_*_check_mtu() we're\nreadding the issue we're trying to fix, that is, it would then be able to\nwrite back into things like .rodata BPF maps. Follow-up work will rework the\nMEM_UNINIT semantics such that the intent can be better expressed. For now\njust clear the *mtu_len on error path which can be lifted later again." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/4b3786a6c5397dc220b1483d8e2f4867743e966f", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/594a9f5a8d2de2573a856e506f77ba7dd2cefc6a", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/599d15b6d03356a97bff7a76155c5604c42a2962", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/8397bf78988f3ae9dbebb0200189a62a57264980", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/a634fa8e480ac2423f86311a602f6295df2c8ed0", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-477xx/CVE-2024-47729.json b/CVE-2024/CVE-2024-477xx/CVE-2024-47729.json new file mode 100644 index 00000000000..785c9c0ae38 --- /dev/null +++ b/CVE-2024/CVE-2024-477xx/CVE-2024-47729.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-47729", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2024-10-21T13:15:03.070", + "lastModified": "2024-10-21T13:15:03.070", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/xe: Use reserved copy engine for user binds on faulting devices\n\nUser binds map to engines with can fault, faults depend on user binds\ncompletion, thus we can deadlock. Avoid this by using reserved copy\nengine for user binds on faulting devices.\n\nWhile we are here, normalize bind queue creation with a helper.\n\nv2:\n - Pass in extensions to bind queue creation (CI)\nv3:\n - s/resevered/reserved (Lucas)\n - Fix NULL hwe check (Jonathan)" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/439fc1e569c57669dbb842d0a77c7ba0a82a9f5d", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/852856e3b6f679c694dd5ec41e5a3c11aa46640b", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-477xx/CVE-2024-47730.json b/CVE-2024/CVE-2024-477xx/CVE-2024-47730.json new file mode 100644 index 00000000000..02e43b25a9c --- /dev/null +++ b/CVE-2024/CVE-2024-477xx/CVE-2024-47730.json @@ -0,0 +1,37 @@ +{ + "id": "CVE-2024-47730", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2024-10-21T13:15:03.160", + "lastModified": "2024-10-21T13:15:03.160", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: hisilicon/qm - inject error before stopping queue\n\nThe master ooo cannot be completely closed when the\naccelerator core reports memory error. Therefore, the driver\nneeds to inject the qm error to close the master ooo. Currently,\nthe qm error is injected after stopping queue, memory may be\nreleased immediately after stopping queue, causing the device to\naccess the released memory. Therefore, error is injected to close master\nooo before stopping queue to ensure that the device does not access\nthe released memory." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/98d3be34c9153eceadb56de50d9f9347e88d86e4", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/aa3e0db35a60002fb34ef0e4ad203aa59fd00203", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/b04f06fc0243600665b3b50253869533b7938468", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/c5f5b813e546f7fe133539c3d7a5086cc8dd2aa1", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/f8024f12752e32ffbbf59e1c09d949f977ff743f", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-477xx/CVE-2024-47731.json b/CVE-2024/CVE-2024-477xx/CVE-2024-47731.json new file mode 100644 index 00000000000..74c99ec1ed2 --- /dev/null +++ b/CVE-2024/CVE-2024-477xx/CVE-2024-47731.json @@ -0,0 +1,37 @@ +{ + "id": "CVE-2024-47731", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2024-10-21T13:15:03.260", + "lastModified": "2024-10-21T13:15:03.260", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrivers/perf: Fix ali_drw_pmu driver interrupt status clearing\n\nThe alibaba_uncore_pmu driver forgot to clear all interrupt status\nin the interrupt processing function. After the PMU counter overflow\ninterrupt occurred, an interrupt storm occurred, causing the system\nto hang.\n\nTherefore, clear the correct interrupt status in the interrupt handling\nfunction to fix it." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/062b7176e484678b2c9072d28fbecea47846b274", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/24f30b34ff76648d26872dd4eaa002f074225058", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/3b839d4619042b02eecdfc986484ac6e6be6acbf", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/85702fddba70d2b63f5646793d77de2ad4fc3784", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/a3dd920977dccc453c550260c4b7605b280b79c3", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-477xx/CVE-2024-47732.json b/CVE-2024/CVE-2024-477xx/CVE-2024-47732.json new file mode 100644 index 00000000000..d048bf677ee --- /dev/null +++ b/CVE-2024/CVE-2024-477xx/CVE-2024-47732.json @@ -0,0 +1,29 @@ +{ + "id": "CVE-2024-47732", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2024-10-21T13:15:03.363", + "lastModified": "2024-10-21T13:15:03.363", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: iaa - Fix potential use after free bug\n\nThe free_device_compression_mode(iaa_device, device_mode) function frees\n\"device_mode\" but it iss passed to iaa_compression_modes[i]->free() a few\nlines later resulting in a use after free.\n\nThe good news is that, so far as I can tell, nothing implements the\n->free() function and the use after free happens in dead code. But, with\nthis fix, when something does implement it, we'll be ready. :)" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/b5d534b473e2c8d3e4560be2dd6c12a8eb9d61e9", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/c66f0be993ba52410edab06124c54ecf143b05c1", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/e0d3b845a1b10b7b5abdad7ecc69d45b2aab3209", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-477xx/CVE-2024-47733.json b/CVE-2024/CVE-2024-477xx/CVE-2024-47733.json new file mode 100644 index 00000000000..4f6f2f8beb9 --- /dev/null +++ b/CVE-2024/CVE-2024-477xx/CVE-2024-47733.json @@ -0,0 +1,29 @@ +{ + "id": "CVE-2024-47733", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2024-10-21T13:15:03.450", + "lastModified": "2024-10-21T13:15:03.450", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfs: Delete subtree of 'fs/netfs' when netfs module exits\n\nIn netfs_init() or fscache_proc_init(), we create dentry under 'fs/netfs',\nbut in netfs_exit(), we only delete the proc entry of 'fs/netfs' without\ndeleting its subtree. This triggers the following WARNING:\n\n==================================================================\nremove_proc_entry: removing non-empty directory 'fs/netfs', leaking at least 'requests'\nWARNING: CPU: 4 PID: 566 at fs/proc/generic.c:717 remove_proc_entry+0x160/0x1c0\nModules linked in: netfs(-)\nCPU: 4 UID: 0 PID: 566 Comm: rmmod Not tainted 6.11.0-rc3 #860\nRIP: 0010:remove_proc_entry+0x160/0x1c0\nCall Trace:\n \n netfs_exit+0x12/0x620 [netfs]\n __do_sys_delete_module.isra.0+0x14c/0x2e0\n do_syscall_64+0x4b/0x110\n entry_SYSCALL_64_after_hwframe+0x76/0x7e\n==================================================================\n\nTherefore use remove_proc_subtree() instead of remove_proc_entry() to\nfix the above problem." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/3c58a9575e02c2b90a3180007d57105ceaa7c246", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/603f95cefbee06a31b03137b777f03e3c2163d72", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/7a9eaf97d56625e55b31a7beb558e1ee185ca461", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-477xx/CVE-2024-47734.json b/CVE-2024/CVE-2024-477xx/CVE-2024-47734.json new file mode 100644 index 00000000000..05e78aceb21 --- /dev/null +++ b/CVE-2024/CVE-2024-477xx/CVE-2024-47734.json @@ -0,0 +1,41 @@ +{ + "id": "CVE-2024-47734", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2024-10-21T13:15:03.547", + "lastModified": "2024-10-21T13:15:03.547", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nbonding: Fix unnecessary warnings and logs from bond_xdp_get_xmit_slave()\n\nsyzbot reported a WARNING in bond_xdp_get_xmit_slave. To reproduce\nthis[1], one bond device (bond1) has xdpdrv, which increases\nbpf_master_redirect_enabled_key. Another bond device (bond0) which is\nunsupported by XDP but its slave (veth3) has xdpgeneric that returns\nXDP_TX. This triggers WARN_ON_ONCE() from the xdp_master_redirect().\nTo reduce unnecessary warnings and improve log management, we need to\ndelete the WARN_ON_ONCE() and add ratelimit to the netdev_err().\n\n[1] Steps to reproduce:\n # Needs tx_xdp with return XDP_TX;\n ip l add veth0 type veth peer veth1\n ip l add veth3 type veth peer veth4\n ip l add bond0 type bond mode 6 # BOND_MODE_ALB, unsupported by XDP\n ip l add bond1 type bond # BOND_MODE_ROUNDROBIN by default\n ip l set veth0 master bond1\n ip l set bond1 up\n # Increases bpf_master_redirect_enabled_key\n ip l set dev bond1 xdpdrv object tx_xdp.o section xdp_tx\n ip l set veth3 master bond0\n ip l set bond0 up\n ip l set veth4 up\n # Triggers WARN_ON_ONCE() from the xdp_master_redirect()\n ip l set veth3 xdpgeneric object tx_xdp.o section xdp_tx" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/0cbfd45fbcf0cb26d85c981b91c62fe73cdee01c", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/57b5fba55c6f8b1d83312a34bd656166fcd95658", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/6b64197b4bf1a5703a8b105367baf20f1e627a75", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/72e2c0825a480e19ee999cee9d018850d38c82b9", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/c1be35e774f8ed415e01209fddd963c5a74e8e9f", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/ccd3e6ff05e5236d1b9535f23f3e6622e0bb32b8", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-477xx/CVE-2024-47735.json b/CVE-2024/CVE-2024-477xx/CVE-2024-47735.json new file mode 100644 index 00000000000..6f870c1dd29 --- /dev/null +++ b/CVE-2024/CVE-2024-477xx/CVE-2024-47735.json @@ -0,0 +1,45 @@ +{ + "id": "CVE-2024-47735", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2024-10-21T13:15:03.630", + "lastModified": "2024-10-21T13:15:03.630", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/hns: Fix spin_unlock_irqrestore() called with IRQs enabled\n\nFix missuse of spin_lock_irq()/spin_unlock_irq() when\nspin_lock_irqsave()/spin_lock_irqrestore() was hold.\n\nThis was discovered through the lock debugging, and the corresponding\nlog is as follows:\n\nraw_local_irq_restore() called with IRQs enabled\nWARNING: CPU: 96 PID: 2074 at kernel/locking/irqflag-debug.c:10 warn_bogus_irq_restore+0x30/0x40\n...\nCall trace:\n warn_bogus_irq_restore+0x30/0x40\n _raw_spin_unlock_irqrestore+0x84/0xc8\n add_qp_to_list+0x11c/0x148 [hns_roce_hw_v2]\n hns_roce_create_qp_common.constprop.0+0x240/0x780 [hns_roce_hw_v2]\n hns_roce_create_qp+0x98/0x160 [hns_roce_hw_v2]\n create_qp+0x138/0x258\n ib_create_qp_kernel+0x50/0xe8\n create_mad_qp+0xa8/0x128\n ib_mad_port_open+0x218/0x448\n ib_mad_init_device+0x70/0x1f8\n add_client_context+0xfc/0x220\n enable_device_and_get+0xd0/0x140\n ib_register_device.part.0+0xf4/0x1c8\n ib_register_device+0x34/0x50\n hns_roce_register_device+0x174/0x3d0 [hns_roce_hw_v2]\n hns_roce_init+0xfc/0x2c0 [hns_roce_hw_v2]\n __hns_roce_hw_v2_init_instance+0x7c/0x1d0 [hns_roce_hw_v2]\n hns_roce_hw_v2_init_instance+0x9c/0x180 [hns_roce_hw_v2]" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/07f0f643d7e570dbe8ef6f5c3367a43e3086a335", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/094a1821903f33fb91de4b71087773ee16aeb3a0", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/2656336a84fcb6802f6e6c233f4661891deea24f", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/29c0f546d3fd66238b42cf25bcd5f193bb1cf794", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/425589d4af09c49574bd71ac31f811362a5126c3", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/74d315b5af180220d561684d15897730135733a6", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/a1a3403bb1826c8ec787f0d60c3e7b54f419129e", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-477xx/CVE-2024-47736.json b/CVE-2024/CVE-2024-477xx/CVE-2024-47736.json new file mode 100644 index 00000000000..d1cb70dc7d2 --- /dev/null +++ b/CVE-2024/CVE-2024-477xx/CVE-2024-47736.json @@ -0,0 +1,29 @@ +{ + "id": "CVE-2024-47736", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2024-10-21T13:15:03.737", + "lastModified": "2024-10-21T13:15:03.737", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nerofs: handle overlapped pclusters out of crafted images properly\n\nsyzbot reported a task hang issue due to a deadlock case where it is\nwaiting for the folio lock of a cached folio that will be used for\ncache I/Os.\n\nAfter looking into the crafted fuzzed image, I found it's formed with\nseveral overlapped big pclusters as below:\n\n Ext: logical offset | length : physical offset | length\n 0: 0.. 16384 | 16384 : 151552.. 167936 | 16384\n 1: 16384.. 32768 | 16384 : 155648.. 172032 | 16384\n 2: 32768.. 49152 | 16384 : 537223168.. 537239552 | 16384\n...\n\nHere, extent 0/1 are physically overlapped although it's entirely\n_impossible_ for normal filesystem images generated by mkfs.\n\nFirst, managed folios containing compressed data will be marked as\nup-to-date and then unlocked immediately (unlike in-place folios) when\ncompressed I/Os are complete. If physical blocks are not submitted in\nthe incremental order, there should be separate BIOs to avoid dependency\nissues. However, the current code mis-arranges z_erofs_fill_bio_vec()\nand BIO submission which causes unexpected BIO waits.\n\nSecond, managed folios will be connected to their own pclusters for\nefficient inter-queries. However, this is somewhat hard to implement\neasily if overlapped big pclusters exist. Again, these only appear in\nfuzzed images so let's simply fall back to temporary short-lived pages\nfor correctness.\n\nAdditionally, it justifies that referenced managed folios cannot be\ntruncated for now and reverts part of commit 2080ca1ed3e4 (\"erofs: tidy\nup `struct z_erofs_bvec`\") for simplicity although it shouldn't be any\ndifference." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/9cfa199bcbbbba31cbf97b2786f44f4464f3f29a", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/9e2f9d34dd12e6e5b244ec488bcebd0c2d566c50", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/b9b30af0e86ffb485301ecd83b9129c9dfb7ebf8", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-477xx/CVE-2024-47737.json b/CVE-2024/CVE-2024-477xx/CVE-2024-47737.json new file mode 100644 index 00000000000..a29adac75ac --- /dev/null +++ b/CVE-2024/CVE-2024-477xx/CVE-2024-47737.json @@ -0,0 +1,45 @@ +{ + "id": "CVE-2024-47737", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2024-10-21T13:15:03.833", + "lastModified": "2024-10-21T13:15:03.833", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnfsd: call cache_put if xdr_reserve_space returns NULL\n\nIf not enough buffer space available, but idmap_lookup has triggered\nlookup_fn which calls cache_get and returns successfully. Then we\nmissed to call cache_put here which pairs with cache_get.\n\nReviwed-by: Jeff Layton " + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/81821617312988096f5deccf0f7da6f888e98056", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/8d0765f86135e27f0bb5c950c136495719b4c834", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/9803ab882d565a8fb2dde5999d98866d1c499dfd", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/9f03f0016ff797932551881c7e06ae50e9c39134", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/a1afbbb5276f943ad7173d0b4c626b8c75a260da", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/d078cbf5c38de83bc31f83c47dcd2184c04a50c7", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/e32ee6a61041925d1a05c14d10352dcfce9ef029", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-477xx/CVE-2024-47738.json b/CVE-2024/CVE-2024-477xx/CVE-2024-47738.json new file mode 100644 index 00000000000..9091a8a6a71 --- /dev/null +++ b/CVE-2024/CVE-2024-477xx/CVE-2024-47738.json @@ -0,0 +1,37 @@ +{ + "id": "CVE-2024-47738", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2024-10-21T13:15:03.920", + "lastModified": "2024-10-21T13:15:03.920", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: mac80211: don't use rate mask for offchannel TX either\n\nLike the commit ab9177d83c04 (\"wifi: mac80211: don't use rate mask for\nscanning\"), ignore incorrect settings to avoid no supported rate warning\nreported by syzbot.\n\nThe syzbot did bisect and found cause is commit 9df66d5b9f45 (\"cfg80211:\nfix default HE tx bitrate mask in 2G band\"), which however corrects\nbitmask of HE MCS and recognizes correctly settings of empty legacy rate\nplus HE MCS rate instead of returning -EINVAL.\n\nAs suggestions [1], follow the change of SCAN TX to consider this case of\noffchannel TX as well.\n\n[1] https://lore.kernel.org/linux-wireless/6ab2dc9c3afe753ca6fdcdd1421e7a1f47e87b84.camel@sipsolutions.net/T/#m2ac2a6d2be06a37c9c47a3d8a44b4f647ed4f024" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/3565ef215101ffadb5fe5394c70b1fca51376b25", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/43897111481b679508711d3ca881c4c6593e9247", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/aafca50e71dc8f3192a5bfb325135a7908f3ef9e", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/d54455a3a965feb547711aff7afd2ca5deadb99c", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/e7a7ef9a0742dbd0818d5b15fba2c5313ace765b", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-477xx/CVE-2024-47739.json b/CVE-2024/CVE-2024-477xx/CVE-2024-47739.json new file mode 100644 index 00000000000..0234bcab55c --- /dev/null +++ b/CVE-2024/CVE-2024-477xx/CVE-2024-47739.json @@ -0,0 +1,45 @@ +{ + "id": "CVE-2024-47739", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2024-10-21T13:15:04.017", + "lastModified": "2024-10-21T13:15:04.017", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\npadata: use integer wrap around to prevent deadlock on seq_nr overflow\n\nWhen submitting more than 2^32 padata objects to padata_do_serial, the\ncurrent sorting implementation incorrectly sorts padata objects with\noverflowed seq_nr, causing them to be placed before existing objects in\nthe reorder list. This leads to a deadlock in the serialization process\nas padata_find_next cannot match padata->seq_nr and pd->processed\nbecause the padata instance with overflowed seq_nr will be selected\nnext.\n\nTo fix this, we use an unsigned integer wrap around to correctly sort\npadata objects in scenarios with integer overflow." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/1b8cf11b3ca593a8802a51802cd0c28c38501428", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/1bd712de96ad7167fe0d608e706cd60587579f16", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/46c4079460f4dcaf445860679558eedef4e1bc91", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/72164d5b648951684b1a593996b37a6083c61d7d", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/9a22b2812393d93d84358a760c347c21939029a6", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/9e279e6c1f012b82628b89e1b9c65dbefa8ca25a", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/ab205e1c3846326f162180e56825b4ba38ce9c30", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-477xx/CVE-2024-47740.json b/CVE-2024/CVE-2024-477xx/CVE-2024-47740.json new file mode 100644 index 00000000000..2ec05765375 --- /dev/null +++ b/CVE-2024/CVE-2024-477xx/CVE-2024-47740.json @@ -0,0 +1,45 @@ +{ + "id": "CVE-2024-47740", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2024-10-21T13:15:04.103", + "lastModified": "2024-10-21T13:15:04.103", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nf2fs: Require FMODE_WRITE for atomic write ioctls\n\nThe F2FS ioctls for starting and committing atomic writes check for\ninode_owner_or_capable(), but this does not give LSMs like SELinux or\nLandlock an opportunity to deny the write access - if the caller's FSUID\nmatches the inode's UID, inode_owner_or_capable() immediately returns true.\n\nThere are scenarios where LSMs want to deny a process the ability to write\nparticular files, even files that the FSUID of the process owns; but this\ncan currently partially be bypassed using atomic write ioctls in two ways:\n\n - F2FS_IOC_START_ATOMIC_REPLACE + F2FS_IOC_COMMIT_ATOMIC_WRITE can\n truncate an inode to size 0\n - F2FS_IOC_START_ATOMIC_WRITE + F2FS_IOC_ABORT_ATOMIC_WRITE can revert\n changes another process concurrently made to a file\n\nFix it by requiring FMODE_WRITE for these operations, just like for\nF2FS_IOC_MOVE_RANGE. Since any legitimate caller should only be using these\nioctls when intending to write into the file, that seems unlikely to break\nanything." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/000bab8753ae29a259feb339b99ee759795a48ac", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/32f348ecc149e9ca70a1c424ae8fa9b6919d2713", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/4583290898c13c2c2e5eb8773886d153c2c5121d", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/4f5a100f87f32cb65d4bb1ad282a08c92f6f591e", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/5e0de753bfe87768ebe6744d869caa92f35e5731", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/88ff021e1fea2d9b40b2d5efd9013c89f7be04ac", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/f3bfac2cabf5333506b263bc0c8497c95302f32d", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-477xx/CVE-2024-47741.json b/CVE-2024/CVE-2024-477xx/CVE-2024-47741.json new file mode 100644 index 00000000000..a7b43884c6f --- /dev/null +++ b/CVE-2024/CVE-2024-477xx/CVE-2024-47741.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2024-47741", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2024-10-21T13:15:04.207", + "lastModified": "2024-10-21T13:15:04.207", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: fix race setting file private on concurrent lseek using same fd\n\nWhen doing concurrent lseek(2) system calls against the same file\ndescriptor, using multiple threads belonging to the same process, we have\na short time window where a race happens and can result in a memory leak.\n\nThe race happens like this:\n\n1) A program opens a file descriptor for a file and then spawns two\n threads (with the pthreads library for example), lets call them\n task A and task B;\n\n2) Task A calls lseek with SEEK_DATA or SEEK_HOLE and ends up at\n file.c:find_desired_extent() while holding a read lock on the inode;\n\n3) At the start of find_desired_extent(), it extracts the file's\n private_data pointer into a local variable named 'private', which has\n a value of NULL;\n\n4) Task B also calls lseek with SEEK_DATA or SEEK_HOLE, locks the inode\n in shared mode and enters file.c:find_desired_extent(), where it also\n extracts file->private_data into its local variable 'private', which\n has a NULL value;\n\n5) Because it saw a NULL file private, task A allocates a private\n structure and assigns to the file structure;\n\n6) Task B also saw a NULL file private so it also allocates its own file\n private and then assigns it to the same file structure, since both\n tasks are using the same file descriptor.\n\n At this point we leak the private structure allocated by task A.\n\nBesides the memory leak, there's also the detail that both tasks end up\nusing the same cached state record in the private structure (struct\nbtrfs_file_private::llseek_cached_state), which can result in a\nuse-after-free problem since one task can free it while the other is\nstill using it (only one task took a reference count on it). Also, sharing\nthe cached state is not a good idea since it could result in incorrect\nresults in the future - right now it should not be a problem because it\nend ups being used only in extent-io-tree.c:count_range_bits() where we do\nrange validation before using the cached state.\n\nFix this by protecting the private assignment and check of a file while\nholding the inode's spinlock and keep track of the task that allocated\nthe private, so that it's used only by that task in order to prevent\nuser-after-free issues with the cached state record as well as potentially\nusing it incorrectly in the future." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/33d1310d4496e904123dab9c28b2d8d2c1800f97", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/7ee85f5515e86a4e2a2f51969795920733912bad", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/a412ca489ac27b9d0e603499315b7139c948130d", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/f56a6d9c267ec7fa558ede7755551c047b1034cd", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-477xx/CVE-2024-47742.json b/CVE-2024/CVE-2024-477xx/CVE-2024-47742.json new file mode 100644 index 00000000000..50d976a5628 --- /dev/null +++ b/CVE-2024/CVE-2024-477xx/CVE-2024-47742.json @@ -0,0 +1,45 @@ +{ + "id": "CVE-2024-47742", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2024-10-21T13:15:04.297", + "lastModified": "2024-10-21T13:15:04.297", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nfirmware_loader: Block path traversal\n\nMost firmware names are hardcoded strings, or are constructed from fairly\nconstrained format strings where the dynamic parts are just some hex\nnumbers or such.\n\nHowever, there are a couple codepaths in the kernel where firmware file\nnames contain string components that are passed through from a device or\nsemi-privileged userspace; the ones I could find (not counting interfaces\nthat require root privileges) are:\n\n - lpfc_sli4_request_firmware_update() seems to construct the firmware\n filename from \"ModelName\", a string that was previously parsed out of\n some descriptor (\"Vital Product Data\") in lpfc_fill_vpd()\n - nfp_net_fw_find() seems to construct a firmware filename from a model\n name coming from nfp_hwinfo_lookup(pf->hwinfo, \"nffw.partno\"), which I\n think parses some descriptor that was read from the device.\n (But this case likely isn't exploitable because the format string looks\n like \"netronome/nic_%s\", and there shouldn't be any *folders* starting\n with \"netronome/nic_\". The previous case was different because there,\n the \"%s\" is *at the start* of the format string.)\n - module_flash_fw_schedule() is reachable from the\n ETHTOOL_MSG_MODULE_FW_FLASH_ACT netlink command, which is marked as\n GENL_UNS_ADMIN_PERM (meaning CAP_NET_ADMIN inside a user namespace is\n enough to pass the privilege check), and takes a userspace-provided\n firmware name.\n (But I think to reach this case, you need to have CAP_NET_ADMIN over a\n network namespace that a special kind of ethernet device is mapped into,\n so I think this is not a viable attack path in practice.)\n\nFix it by rejecting any firmware names containing \"..\" path components.\n\nFor what it's worth, I went looking and haven't found any USB device\ndrivers that use the firmware loader dangerously." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/28f1cd94d3f1092728fb775a0fe26c5f1ac2ebeb", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/3d2411f4edcb649eaf232160db459bb4770b5251", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/6c4e13fdfcab34811c3143a0a03c05fec4e870ec", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/7420c1bf7fc784e587b87329cc6dfa3dca537aa4", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/a77fc4acfd49fc6076e565445b2bc5fdc3244da4", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/c30558e6c5c9ad6c86459d9acce1520ceeab9ea6", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/f0e5311aa8022107d63c54e2f03684ec097d1394", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-477xx/CVE-2024-47743.json b/CVE-2024/CVE-2024-477xx/CVE-2024-47743.json new file mode 100644 index 00000000000..94c61c780e6 --- /dev/null +++ b/CVE-2024/CVE-2024-477xx/CVE-2024-47743.json @@ -0,0 +1,37 @@ +{ + "id": "CVE-2024-47743", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2024-10-21T13:15:04.393", + "lastModified": "2024-10-21T13:15:04.393", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nKEYS: prevent NULL pointer dereference in find_asymmetric_key()\n\nIn find_asymmetric_key(), if all NULLs are passed in the id_{0,1,2}\narguments, the kernel will first emit WARN but then have an oops\nbecause id_2 gets dereferenced anyway.\n\nAdd the missing id_2 check and move WARN_ON() to the final else branch\nto avoid duplicate NULL checks.\n\nFound by Linux Verification Center (linuxtesting.org) with Svace static\nanalysis tool." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/0d3b0706ada15c333e6f9faf19590ff715e45d1e", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/13b5b401ead95b5d8266f64904086c55b6024900", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/3322fa8f2aa40b0b3651034cd541647a600cc6c0", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/70fd1966c93bf3bfe3fe6d753eb3d83a76597eef", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/a3765b497a4f5224cb2f7a6a2d3357d3066214ee", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-477xx/CVE-2024-47744.json b/CVE-2024/CVE-2024-477xx/CVE-2024-47744.json new file mode 100644 index 00000000000..8b125789ffb --- /dev/null +++ b/CVE-2024/CVE-2024-477xx/CVE-2024-47744.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2024-47744", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2024-10-21T13:15:04.480", + "lastModified": "2024-10-21T13:15:04.480", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nKVM: Use dedicated mutex to protect kvm_usage_count to avoid deadlock\n\nUse a dedicated mutex to guard kvm_usage_count to fix a potential deadlock\non x86 due to a chain of locks and SRCU synchronizations. Translating the\nbelow lockdep splat, CPU1 #6 will wait on CPU0 #1, CPU0 #8 will wait on\nCPU2 #3, and CPU2 #7 will wait on CPU1 #4 (if there's a writer, due to the\nfairness of r/w semaphores).\n\n CPU0 CPU1 CPU2\n1 lock(&kvm->slots_lock);\n2 lock(&vcpu->mutex);\n3 lock(&kvm->srcu);\n4 lock(cpu_hotplug_lock);\n5 lock(kvm_lock);\n6 lock(&kvm->slots_lock);\n7 lock(cpu_hotplug_lock);\n8 sync(&kvm->srcu);\n\nNote, there are likely more potential deadlocks in KVM x86, e.g. the same\npattern of taking cpu_hotplug_lock outside of kvm_lock likely exists with\n__kvmclock_cpufreq_notifier():\n\n cpuhp_cpufreq_online()\n |\n -> cpufreq_online()\n |\n -> cpufreq_gov_performance_limits()\n |\n -> __cpufreq_driver_target()\n |\n -> __target_index()\n |\n -> cpufreq_freq_transition_begin()\n |\n -> cpufreq_notify_transition()\n |\n -> ... __kvmclock_cpufreq_notifier()\n\nBut, actually triggering such deadlocks is beyond rare due to the\ncombination of dependencies and timings involved. E.g. the cpufreq\nnotifier is only used on older CPUs without a constant TSC, mucking with\nthe NX hugepage mitigation while VMs are running is very uncommon, and\ndoing so while also onlining/offlining a CPU (necessary to generate\ncontention on cpu_hotplug_lock) would be even more unusual.\n\nThe most robust solution to the general cpu_hotplug_lock issue is likely\nto switch vm_list to be an RCU-protected list, e.g. so that x86's cpufreq\nnotifier doesn't to take kvm_lock. For now, settle for fixing the most\nblatant deadlock, as switching to an RCU-protected list is a much more\ninvolved change, but add a comment in locking.rst to call out that care\nneeds to be taken when walking holding kvm_lock and walking vm_list.\n\n ======================================================\n WARNING: possible circular locking dependency detected\n 6.10.0-smp--c257535a0c9d-pip #330 Tainted: G S O\n ------------------------------------------------------\n tee/35048 is trying to acquire lock:\n ff6a80eced71e0a8 (&kvm->slots_lock){+.+.}-{3:3}, at: set_nx_huge_pages+0x179/0x1e0 [kvm]\n\n but task is already holding lock:\n ffffffffc07abb08 (kvm_lock){+.+.}-{3:3}, at: set_nx_huge_pages+0x14a/0x1e0 [kvm]\n\n which lock already depends on the new lock.\n\n the existing dependency chain (in reverse order) is:\n\n -> #3 (kvm_lock){+.+.}-{3:3}:\n __mutex_lock+0x6a/0xb40\n mutex_lock_nested+0x1f/0x30\n kvm_dev_ioctl+0x4fb/0xe50 [kvm]\n __se_sys_ioctl+0x7b/0xd0\n __x64_sys_ioctl+0x21/0x30\n x64_sys_call+0x15d0/0x2e60\n do_syscall_64+0x83/0x160\n entry_SYSCALL_64_after_hwframe+0x76/0x7e\n\n -> #2 (cpu_hotplug_lock){++++}-{0:0}:\n cpus_read_lock+0x2e/0xb0\n static_key_slow_inc+0x16/0x30\n kvm_lapic_set_base+0x6a/0x1c0 [kvm]\n kvm_set_apic_base+0x8f/0xe0 [kvm]\n kvm_set_msr_common+0x9ae/0xf80 [kvm]\n vmx_set_msr+0xa54/0xbe0 [kvm_intel]\n __kvm_set_msr+0xb6/0x1a0 [kvm]\n kvm_arch_vcpu_ioctl+0xeca/0x10c0 [kvm]\n kvm_vcpu_ioctl+0x485/0x5b0 [kvm]\n __se_sys_ioctl+0x7b/0xd0\n __x64_sys_ioctl+0x21/0x30\n x64_sys_call+0x15d0/0x2e60\n do_syscall_64+0x83/0x160\n entry_SYSCALL_64_after_hwframe+0x76/0x7e\n\n -> #1 (&kvm->srcu){.+.+}-{0:0}:\n __synchronize_srcu+0x44/0x1a0\n \n---truncated---" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/44d17459626052a2390457e550a12cb973506b2f", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/4777225ec89f52bb9ca16a33cfb44c189f1b7b47", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/760a196e6dcb29580e468b44b5400171dae184d8", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/a2764afce521fd9fd7a5ff6ed52ac2095873128a", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-477xx/CVE-2024-47745.json b/CVE-2024/CVE-2024-477xx/CVE-2024-47745.json new file mode 100644 index 00000000000..9fff8b41d2d --- /dev/null +++ b/CVE-2024/CVE-2024-477xx/CVE-2024-47745.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2024-47745", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2024-10-21T13:15:04.580", + "lastModified": "2024-10-21T13:15:04.580", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm: call the security_mmap_file() LSM hook in remap_file_pages()\n\nThe remap_file_pages syscall handler calls do_mmap() directly, which\ndoesn't contain the LSM security check. And if the process has called\npersonality(READ_IMPLIES_EXEC) before and remap_file_pages() is called for\nRW pages, this will actually result in remapping the pages to RWX,\nbypassing a W^X policy enforced by SELinux.\n\nSo we should check prot by security_mmap_file LSM hook in the\nremap_file_pages syscall handler before do_mmap() is called. Otherwise, it\npotentially permits an attacker to bypass a W^X policy enforced by\nSELinux.\n\nThe bypass is similar to CVE-2016-10044, which bypass the same thing via\nAIO and can be found in [1].\n\nThe PoC:\n\n$ cat > test.c\n\nint main(void) {\n\tsize_t pagesz = sysconf(_SC_PAGE_SIZE);\n\tint mfd = syscall(SYS_memfd_create, \"test\", 0);\n\tconst char *buf = mmap(NULL, 4 * pagesz, PROT_READ | PROT_WRITE,\n\t\tMAP_SHARED, mfd, 0);\n\tunsigned int old = syscall(SYS_personality, 0xffffffff);\n\tsyscall(SYS_personality, READ_IMPLIES_EXEC | old);\n\tsyscall(SYS_remap_file_pages, buf, pagesz, 0, 2, 0);\n\tsyscall(SYS_personality, old);\n\t// show the RWX page exists even if W^X policy is enforced\n\tint fd = open(\"/proc/self/maps\", O_RDONLY);\n\tunsigned char buf2[1024];\n\twhile (1) {\n\t\tint ret = read(fd, buf2, 1024);\n\t\tif (ret <= 0) break;\n\t\twrite(1, buf2, ret);\n\t}\n\tclose(fd);\n}\n\n$ gcc test.c -o test\n$ ./test | grep rwx\n7f1836c34000-7f1836c35000 rwxs 00002000 00:01 2050 /memfd:test (deleted)\n\n[PM: subject line tweaks]" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/3393fddbfa947c8e1fdcc4509226905ffffd8b89", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/49d3a4ad57c57227c3b0fd6cd4188b2a5ebd6178", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/ce14f38d6ee9e88e37ec28427b4b93a7c33c70d3", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/ea7e2d5e49c05e5db1922387b09ca74aa40f46e2", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-477xx/CVE-2024-47746.json b/CVE-2024/CVE-2024-477xx/CVE-2024-47746.json new file mode 100644 index 00000000000..4ba1ffa7f9b --- /dev/null +++ b/CVE-2024/CVE-2024-477xx/CVE-2024-47746.json @@ -0,0 +1,29 @@ +{ + "id": "CVE-2024-47746", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2024-10-21T13:15:04.667", + "lastModified": "2024-10-21T13:15:04.667", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nfuse: use exclusive lock when FUSE_I_CACHE_IO_MODE is set\n\nThis may be a typo. The comment has said shared locks are\nnot allowed when this bit is set. If using shared lock, the\nwait in `fuse_file_cached_io_open` may be forever." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/2f3d8ff457982f4055fe8f7bf19d3821ba22c376", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/4e181761ffec67307157a7e8a78d58ee4130cf00", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/fa4890bd8237e5a1e7428acd7328729db2703b23", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-477xx/CVE-2024-47747.json b/CVE-2024/CVE-2024-477xx/CVE-2024-47747.json new file mode 100644 index 00000000000..e524a60f0a8 --- /dev/null +++ b/CVE-2024/CVE-2024-477xx/CVE-2024-47747.json @@ -0,0 +1,45 @@ +{ + "id": "CVE-2024-47747", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2024-10-21T13:15:04.753", + "lastModified": "2024-10-21T13:15:04.753", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: seeq: Fix use after free vulnerability in ether3 Driver Due to Race Condition\n\nIn the ether3_probe function, a timer is initialized with a callback\nfunction ether3_ledoff, bound to &prev(dev)->timer. Once the timer is\nstarted, there is a risk of a race condition if the module or device\nis removed, triggering the ether3_remove function to perform cleanup.\nThe sequence of operations that may lead to a UAF bug is as follows:\n\nCPU0 CPU1\n\n | ether3_ledoff\nether3_remove |\n free_netdev(dev); |\n put_devic |\n kfree(dev); |\n | ether3_outw(priv(dev)->regs.config2 |= CFG2_CTRLO, REG_CONFIG2);\n | // use dev\n\nFix it by ensuring that the timer is canceled before proceeding with\nthe cleanup in ether3_remove." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/1c57d61a43293252ad732007c7070fdb112545fd", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/338a0582b28e69460df03af50e938b86b4206353", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/516dbc6d16637430808c39568cbb6b841d32b55b", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/77a77331cef0a219b8dd91361435eeef04cb741c", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/822c7bb1f6f8b0331e8d1927151faf8db3b33afd", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/b5109b60ee4fcb2f2bb24f589575e10cc5283ad4", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/d2abc379071881798d20e2ac1d332ad855ae22f3", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-477xx/CVE-2024-47748.json b/CVE-2024/CVE-2024-477xx/CVE-2024-47748.json new file mode 100644 index 00000000000..f1162e269a6 --- /dev/null +++ b/CVE-2024/CVE-2024-477xx/CVE-2024-47748.json @@ -0,0 +1,45 @@ +{ + "id": "CVE-2024-47748", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2024-10-21T13:15:04.857", + "lastModified": "2024-10-21T13:15:04.857", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nvhost_vdpa: assign irq bypass producer token correctly\n\nWe used to call irq_bypass_unregister_producer() in\nvhost_vdpa_setup_vq_irq() which is problematic as we don't know if the\ntoken pointer is still valid or not.\n\nActually, we use the eventfd_ctx as the token so the life cycle of the\ntoken should be bound to the VHOST_SET_VRING_CALL instead of\nvhost_vdpa_setup_vq_irq() which could be called by set_status().\n\nFixing this by setting up irq bypass producer's token when handling\nVHOST_SET_VRING_CALL and un-registering the producer before calling\nvhost_vring_ioctl() to prevent a possible use after free as eventfd\ncould have been released in vhost_vring_ioctl(). And such registering\nand unregistering will only be done if DRIVER_OK is set." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/02e9e9366fefe461719da5d173385b6685f70319", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/0c170b1e918b9afac25e2bbd01eaa2bfc0ece8c0", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/7cf2fb51175cafe01df8c43fa15a06194a59c6e2", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/927a2580208e0f9b0b47b08f1c802b7233a7ba3c", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/ca64edd7ae93402af2596a952e0d94d545e2b9c0", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/ec5f1b54ceb23475049ada6e7a43452cf4df88d1", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/fae9b1776f53aab93ab345bdbf653b991aed717d", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-477xx/CVE-2024-47749.json b/CVE-2024/CVE-2024-477xx/CVE-2024-47749.json new file mode 100644 index 00000000000..fad35f7d998 --- /dev/null +++ b/CVE-2024/CVE-2024-477xx/CVE-2024-47749.json @@ -0,0 +1,45 @@ +{ + "id": "CVE-2024-47749", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2024-10-21T13:15:04.950", + "lastModified": "2024-10-21T13:15:04.950", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/cxgb4: Added NULL check for lookup_atid\n\nThe lookup_atid() function can return NULL if the ATID is\ninvalid or does not exist in the identifier table, which\ncould lead to dereferencing a null pointer without a\ncheck in the `act_establish()` and `act_open_rpl()` functions.\nAdd a NULL check to prevent null pointer dereferencing.\n\nFound by Linux Verification Center (linuxtesting.org) with SVACE." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/0d50ae281a1712b9b2ca72830a96b8f11882358d", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/39cb9f39913566ec5865581135f3e8123ad1aee1", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/54aaa3ed40972511e423b604324b881425b9ff1e", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/b11318dc8a1ec565300bb1a9073095af817cc508", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/b9c94c8ba5a713817cffd74c4bacc05187469624", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/dd598ac57dcae796cb58551074660c39b43fb155", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/e766e6a92410ca269161de059fff0843b8ddd65f", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-477xx/CVE-2024-47750.json b/CVE-2024/CVE-2024-477xx/CVE-2024-47750.json new file mode 100644 index 00000000000..ceb6ee257dc --- /dev/null +++ b/CVE-2024/CVE-2024-477xx/CVE-2024-47750.json @@ -0,0 +1,37 @@ +{ + "id": "CVE-2024-47750", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2024-10-21T13:15:05.037", + "lastModified": "2024-10-21T13:15:05.037", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/hns: Fix Use-After-Free of rsv_qp on HIP08\n\nCurrently rsv_qp is freed before ib_unregister_device() is called\non HIP08. During the time interval, users can still dereg MR and\nrsv_qp will be used in this process, leading to a UAF. Move the\nrelease of rsv_qp after calling ib_unregister_device() to fix it." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/2ccf1c75d39949d8ea043d04a2e92d7100ea723d", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/60595923371c2ebe7faf82536c47eb0c967e3425", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/d2d9c5127122745da6e887f451dd248cfeffca33", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/dac2723d8bfa9cf5333f477741e6e5fa1ed34645", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/fd8489294dd2beefb70f12ec4f6132aeec61a4d0", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-477xx/CVE-2024-47751.json b/CVE-2024/CVE-2024-477xx/CVE-2024-47751.json new file mode 100644 index 00000000000..822bd89ecae --- /dev/null +++ b/CVE-2024/CVE-2024-477xx/CVE-2024-47751.json @@ -0,0 +1,37 @@ +{ + "id": "CVE-2024-47751", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2024-10-21T13:15:05.123", + "lastModified": "2024-10-21T13:15:05.123", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nPCI: kirin: Fix buffer overflow in kirin_pcie_parse_port()\n\nWithin kirin_pcie_parse_port(), the pcie->num_slots is compared to\npcie->gpio_id_reset size (MAX_PCI_SLOTS) which is correct and would lead\nto an overflow.\n\nThus, fix condition to pcie->num_slots + 1 >= MAX_PCI_SLOTS and move\npcie->num_slots increment below the if-statement to avoid out-of-bounds\narray access.\n\nFound by Linux Verification Center (linuxtesting.org) with SVACE.\n\n[kwilczynski: commit log]" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/6dcc5b49d6607a741a14122bf3105f3ac50d259e", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/95248d7497bcbfe7deed4805469c6ff6ddd7f9d1", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/a5f795f9412854df28e66679c5e6b68b0b79c229", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/aeb0335971806e15ac91e838ca471936c8e7efd5", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/c500a86693a126c9393e602741e348f80f1b0fc5", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-477xx/CVE-2024-47752.json b/CVE-2024/CVE-2024-477xx/CVE-2024-47752.json new file mode 100644 index 00000000000..f5ee59b55dd --- /dev/null +++ b/CVE-2024/CVE-2024-477xx/CVE-2024-47752.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2024-47752", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2024-10-21T13:15:05.203", + "lastModified": "2024-10-21T13:15:05.203", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: mediatek: vcodec: Fix H264 stateless decoder smatch warning\n\nFix a smatch static checker warning on vdec_h264_req_if.c.\nWhich leads to a kernel crash when fb is NULL." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/18181b0c1c5bd43846e5e0ae3d61a4a1adceab03", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/7878d3a385efab560dce793b595447867fb163f2", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/790d1848fac5ac3b1c474f66162598ab07a20c21", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/c6b9f971b43980de8893610f606d751131fb5d86", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-477xx/CVE-2024-47753.json b/CVE-2024/CVE-2024-477xx/CVE-2024-47753.json new file mode 100644 index 00000000000..f7238935b9f --- /dev/null +++ b/CVE-2024/CVE-2024-477xx/CVE-2024-47753.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2024-47753", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2024-10-21T13:15:05.283", + "lastModified": "2024-10-21T13:15:05.283", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: mediatek: vcodec: Fix VP8 stateless decoder smatch warning\n\nFix a smatch static checker warning on vdec_vp8_req_if.c.\nWhich leads to a kernel crash when fb is NULL." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/3167aa42941b68405a092df114453ef0f1b09c2c", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/35cc704622b3a9bc02a4755d5ba80238eee3cdc2", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/b113bc7c0e83b32f4dd2d291a2b6c4803e0a2c44", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/dbe5b7373801c261f3ea118145fbb2caac5f9324", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-477xx/CVE-2024-47754.json b/CVE-2024/CVE-2024-477xx/CVE-2024-47754.json new file mode 100644 index 00000000000..fe7cfb1f0f9 --- /dev/null +++ b/CVE-2024/CVE-2024-477xx/CVE-2024-47754.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2024-47754", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2024-10-21T13:15:05.377", + "lastModified": "2024-10-21T13:15:05.377", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: mediatek: vcodec: Fix H264 multi stateless decoder smatch warning\n\nFix a smatch static checker warning on vdec_h264_req_multi_if.c.\nWhich leads to a kernel crash when fb is NULL." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/301f7778263116388c20521a1a641067647ab31c", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/47b3b97930913ca74a595cc12bdbb650259afc6e", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/588bcce9e64cc5138858ab562268eb3943c5b06c", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/9be85491619f1953b8a29590ca630be571941ffa", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-477xx/CVE-2024-47755.json b/CVE-2024/CVE-2024-477xx/CVE-2024-47755.json new file mode 100644 index 00000000000..8e14fb2bf52 --- /dev/null +++ b/CVE-2024/CVE-2024-477xx/CVE-2024-47755.json @@ -0,0 +1,37 @@ +{ + "id": "CVE-2024-47755", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2024-10-21T13:15:05.467", + "lastModified": "2024-10-21T13:15:05.467", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnvdimm: Fix devs leaks in scan_labels()\n\nscan_labels() leaks memory when label scanning fails and it falls back\nto just creating a default \"seed\" namespace for userspace to configure.\nRoot can force the kernel to leak memory.\n\nAllocate the minimum resources unconditionally and release them when\nunneeded to avoid the memory leak.\n\nA kmemleak reports:\nunreferenced object 0xffff88800dda1980 (size 16):\n comm \"kworker/u10:5\", pid 69, jiffies 4294671781\n hex dump (first 16 bytes):\n 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................\n backtrace (crc 0):\n [<00000000c5dea560>] __kmalloc+0x32c/0x470\n [<000000009ed43c83>] nd_region_register_namespaces+0x6fb/0x1120 [libnvdimm]\n [<000000000e07a65c>] nd_region_probe+0xfe/0x210 [libnvdimm]\n [<000000007b79ce5f>] nvdimm_bus_probe+0x7a/0x1e0 [libnvdimm]\n [<00000000a5f3da2e>] really_probe+0xc6/0x390\n [<00000000129e2a69>] __driver_probe_device+0x78/0x150\n [<000000002dfed28b>] driver_probe_device+0x1e/0x90\n [<00000000e7048de2>] __device_attach_driver+0x85/0x110\n [<0000000032dca295>] bus_for_each_drv+0x85/0xe0\n [<00000000391c5a7d>] __device_attach+0xbe/0x1e0\n [<0000000026dabec0>] bus_probe_device+0x94/0xb0\n [<00000000c590d936>] device_add+0x656/0x870\n [<000000003d69bfaa>] nd_async_device_register+0xe/0x50 [libnvdimm]\n [<000000003f4c52a4>] async_run_entry_fn+0x2e/0x110\n [<00000000e201f4b0>] process_one_work+0x1ee/0x600\n [<000000006d90d5a9>] worker_thread+0x183/0x350" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/18a672c62d735744c6340eb3f5e58934a5d34cf2", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/45db20bdb5695d06478d35e05fb2550441bed890", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/62c2aa6b1f565d2fc1ec11a6e9e8336ce37a6426", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/939053737edb49ba5bdc5846acb45f11d15b7ab4", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/cdf0dfb3d183bbe0d0b6a6622c53d105074ad384", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-477xx/CVE-2024-47756.json b/CVE-2024/CVE-2024-477xx/CVE-2024-47756.json new file mode 100644 index 00000000000..7e07a702215 --- /dev/null +++ b/CVE-2024/CVE-2024-477xx/CVE-2024-47756.json @@ -0,0 +1,45 @@ +{ + "id": "CVE-2024-47756", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2024-10-21T13:15:05.550", + "lastModified": "2024-10-21T13:15:05.550", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nPCI: keystone: Fix if-statement expression in ks_pcie_quirk()\n\nThis code accidentally uses && where || was intended. It potentially\nresults in a NULL dereference.\n\nThus, fix the if-statement expression to use the correct condition.\n\n[kwilczynski: commit log]" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/2171c5cb2fbc3e03af7e8116cd58736c09328655", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/23838bef2adb714ec37b2d6141dccf4a3a70bdef", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/6188a1c762eb9bbd444f47696eda77a5eae6207a", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/72210e52e19a27f615e0b5273d2bf012d0dc318d", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/c289903b7a216df5ea6e1850ddf1b958eea9921d", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/dc5aeba07395c8dfa29bb878c8ce4d5180427221", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/e85ab507882db165c10a858d7f685a0a38f0312e", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-477xx/CVE-2024-47757.json b/CVE-2024/CVE-2024-477xx/CVE-2024-47757.json new file mode 100644 index 00000000000..3d08b2f6b22 --- /dev/null +++ b/CVE-2024/CVE-2024-477xx/CVE-2024-47757.json @@ -0,0 +1,45 @@ +{ + "id": "CVE-2024-47757", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2024-10-21T13:15:05.640", + "lastModified": "2024-10-21T13:15:05.640", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnilfs2: fix potential oob read in nilfs_btree_check_delete()\n\nThe function nilfs_btree_check_delete(), which checks whether degeneration\nto direct mapping occurs before deleting a b-tree entry, causes memory\naccess outside the block buffer when retrieving the maximum key if the\nroot node has no entries.\n\nThis does not usually happen because b-tree mappings with 0 child nodes\nare never created by mkfs.nilfs2 or nilfs2 itself. However, it can happen\nif the b-tree root node read from a device is configured that way, so fix\nthis potential issue by adding a check for that case." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/257f9e5185eb6de83377caea686c306e22e871f2", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/a33e967b681e088a125b979975c93e3453e686cd", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/a8abfda768b9f33630cfbc4af6c4214f1e5681b0", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/c4cbcc64bb31e67e02940ce060cc77f7180564cf", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/c4f8554996e8ada3be872dfb8f60e93bcf15fb27", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/d20674f31626e0596ae4c1d9401dfb6739b81b58", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/f9c96351aa6718b42a9f42eaf7adce0356bdb5e8", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-482xx/CVE-2024-48231.json b/CVE-2024/CVE-2024-482xx/CVE-2024-48231.json new file mode 100644 index 00000000000..822eeb6e1b2 --- /dev/null +++ b/CVE-2024/CVE-2024-482xx/CVE-2024-48231.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-48231", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-10-21T12:15:08.380", + "lastModified": "2024-10-21T13:15:05.720", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Funadmin 5.0.2 is vulnerable to SQL Injection via the selectFields parameter in the index method of \\backend\\controller\\auth\\Auth.php." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/funadmin/funadmin/issues/29", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-492xx/CVE-2024-49273.json b/CVE-2024/CVE-2024-492xx/CVE-2024-49273.json new file mode 100644 index 00000000000..9d777448dd4 --- /dev/null +++ b/CVE-2024/CVE-2024-492xx/CVE-2024-49273.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-49273", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-10-21T12:15:08.450", + "lastModified": "2024-10-21T12:15:08.450", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in ProfileGrid User Profiles ProfileGrid.This issue affects ProfileGrid: from n/a through 5.9.3." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/profilegrid-user-profiles-groups-and-communities/wordpress-profilegrid-plugin-5-9-3-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-492xx/CVE-2024-49293.json b/CVE-2024/CVE-2024-492xx/CVE-2024-49293.json new file mode 100644 index 00000000000..df2cb7a6ba5 --- /dev/null +++ b/CVE-2024/CVE-2024-492xx/CVE-2024-49293.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-49293", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-10-21T12:15:08.683", + "lastModified": "2024-10-21T12:15:08.683", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in Rextheme WP VR allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WP VR: from n/a through 8.5.4." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/wpvr/wordpress-wp-vr-plugin-8-5-4-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-493xx/CVE-2024-49321.json b/CVE-2024/CVE-2024-493xx/CVE-2024-49321.json new file mode 100644 index 00000000000..edd886a2f2c --- /dev/null +++ b/CVE-2024/CVE-2024-493xx/CVE-2024-49321.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-49321", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-10-21T12:15:08.893", + "lastModified": "2024-10-21T12:15:08.893", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in Colorlib Simple Custom Post Order allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Simple Custom Post Order: from n/a through 2.5.7." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/simple-custom-post-order/wordpress-simple-custom-post-order-plugin-2-5-7-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-498xx/CVE-2024-49850.json b/CVE-2024/CVE-2024-498xx/CVE-2024-49850.json new file mode 100644 index 00000000000..5cf87a7a2b9 --- /dev/null +++ b/CVE-2024/CVE-2024-498xx/CVE-2024-49850.json @@ -0,0 +1,37 @@ +{ + "id": "CVE-2024-49850", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2024-10-21T13:15:05.797", + "lastModified": "2024-10-21T13:15:05.797", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: correctly handle malformed BPF_CORE_TYPE_ID_LOCAL relos\n\nIn case of malformed relocation record of kind BPF_CORE_TYPE_ID_LOCAL\nreferencing a non-existing BTF type, function bpf_core_calc_relo_insn\nwould cause a null pointer deference.\n\nFix this by adding a proper check upper in call stack, as malformed\nrelocation records could be passed from user space.\n\nSimplest reproducer is a program:\n\n r0 = 0\n exit\n\nWith a single relocation record:\n\n .insn_off = 0, /* patch first instruction */\n .type_id = 100500, /* this type id does not exist */\n .access_str_off = 6, /* offset of string \"0\" */\n .kind = BPF_CORE_TYPE_ID_LOCAL,\n\nSee the link for original reproducer or next commit for a test case." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/2288b54b96dcb55bedebcef3572bb8821fc5e708", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/3d2786d65aaa954ebd3fcc033ada433e10da21c4", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/584cd3ff792e1edbea20b2a7df55897159b0be3e", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/dc7ce14f00bcd50641f2110b7a32aa6552e0780f", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/e7e9c5b2dda29067332df2a85b0141a92b41f218", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-498xx/CVE-2024-49851.json b/CVE-2024/CVE-2024-498xx/CVE-2024-49851.json new file mode 100644 index 00000000000..257e04c912e --- /dev/null +++ b/CVE-2024/CVE-2024-498xx/CVE-2024-49851.json @@ -0,0 +1,45 @@ +{ + "id": "CVE-2024-49851", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2024-10-21T13:15:05.883", + "lastModified": "2024-10-21T13:15:05.883", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ntpm: Clean up TPM space after command failure\n\ntpm_dev_transmit prepares the TPM space before attempting command\ntransmission. However if the command fails no rollback of this\npreparation is done. This can result in transient handles being leaked\nif the device is subsequently closed with no further commands performed.\n\nFix this by flushing the space in the event of command transmission\nfailure." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/2c9b228938e9266a1065a3f4fe5c99b7235dc439", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/3f9f72d843c92fb6f4ff7460d774413cde7f254c", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/82478cb8a23bd4f97935bbe60d64528c6d9918b4", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/adf4ce162561222338cf2c9a2caa294527f7f721", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/c84ceb546f30432fccea4891163f7050f5bee5dd", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/e3aaebcbb7c6b403416f442d1de70d437ce313a7", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/ebc4e1f4492d114f9693950621b3ea42b2f82bec", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-498xx/CVE-2024-49852.json b/CVE-2024/CVE-2024-498xx/CVE-2024-49852.json new file mode 100644 index 00000000000..4a3129320e7 --- /dev/null +++ b/CVE-2024/CVE-2024-498xx/CVE-2024-49852.json @@ -0,0 +1,41 @@ +{ + "id": "CVE-2024-49852", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2024-10-21T13:15:05.977", + "lastModified": "2024-10-21T13:15:05.977", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: elx: libefc: Fix potential use after free in efc_nport_vport_del()\n\nThe kref_put() function will call nport->release if the refcount drops to\nzero. The nport->release release function is _efc_nport_free() which frees\n\"nport\". But then we dereference \"nport\" on the next line which is a use\nafter free. Re-order these lines to avoid the use after free." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/16a570f07d870a285b0c0b0d1ca4dff79e8aa5ff", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/2e4b02fad094976763af08fec2c620f4f8edd9ae", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/7c2908985e4ae0ea1b526b3916de9e5351650908", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/98752fcd076a8cbc978016eae7125b4971be1eec", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/abc71e89170ed32ecf0a5a29f31aa711e143e941", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/baeb8628ab7f4577740f00e439d3fdf7c876b0ff", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-498xx/CVE-2024-49853.json b/CVE-2024/CVE-2024-498xx/CVE-2024-49853.json new file mode 100644 index 00000000000..b07c59b5674 --- /dev/null +++ b/CVE-2024/CVE-2024-498xx/CVE-2024-49853.json @@ -0,0 +1,37 @@ +{ + "id": "CVE-2024-49853", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2024-10-21T13:15:06.083", + "lastModified": "2024-10-21T13:15:06.083", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nfirmware: arm_scmi: Fix double free in OPTEE transport\n\nChannels can be shared between protocols, avoid freeing the same channel\ndescriptors twice when unloading the stack." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/6699567b0bbb378600a4dc0a1f929439a4e84a2c", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/aef6ae124bb3cc12e34430fed91fbb7efd7a444d", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/d7f4fc2bc101e666da649605a9ece2bd42529c7a", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/dc9543a4f2a5498a4a12d6d2427492a6f1a28056", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/e98dba934b2fc587eafb83f47ad64d9053b18ae0", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-498xx/CVE-2024-49854.json b/CVE-2024/CVE-2024-498xx/CVE-2024-49854.json new file mode 100644 index 00000000000..948523967bd --- /dev/null +++ b/CVE-2024/CVE-2024-498xx/CVE-2024-49854.json @@ -0,0 +1,41 @@ +{ + "id": "CVE-2024-49854", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2024-10-21T13:15:06.203", + "lastModified": "2024-10-21T13:15:06.203", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nblock, bfq: fix uaf for accessing waker_bfqq after splitting\n\nAfter commit 42c306ed7233 (\"block, bfq: don't break merge chain in\nbfq_split_bfqq()\"), if the current procress is the last holder of bfqq,\nthe bfqq can be freed after bfq_split_bfqq(). Hence recored the bfqq and\nthen access bfqq->waker_bfqq may trigger UAF. What's more, the waker_bfqq\nmay in the merge chain of bfqq, hence just recored waker_bfqq is still\nnot safe.\n\nFix the problem by adding a helper bfq_waker_bfqq() to check if\nbfqq->waker_bfqq is in the merge chain, and current procress is the only\nholder." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/0780451f03bf518bc032a7c584de8f92e2d39d7f", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/0b8bda0ff17156cd3f60944527c9d8c9f99f1583", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/1ba0403ac6447f2d63914fb760c44a3b19c44eaf", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/63a07379fdb6c72450cb05294461c6016b8b7726", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/cae58d19121a70329cf971359e2518c93fec04fe", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/de0456460f2abf921e356ed2bd8da87a376680bd", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-498xx/CVE-2024-49855.json b/CVE-2024/CVE-2024-498xx/CVE-2024-49855.json new file mode 100644 index 00000000000..a522c3ed715 --- /dev/null +++ b/CVE-2024/CVE-2024-498xx/CVE-2024-49855.json @@ -0,0 +1,37 @@ +{ + "id": "CVE-2024-49855", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2024-10-21T13:15:06.270", + "lastModified": "2024-10-21T13:15:06.270", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnbd: fix race between timeout and normal completion\n\nIf request timetout is handled by nbd_requeue_cmd(), normal completion\nhas to be stopped for avoiding to complete this requeued request, other\nuse-after-free can be triggered.\n\nFix the race by clearing NBD_CMD_INFLIGHT in nbd_requeue_cmd(), meantime\nmake sure that cmd->lock is grabbed for clearing the flag and the\nrequeue." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/5236ada8ebbd9e7461f17477357582f5be4f46f7", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/6e73b946a379a1dfbb62626af93843bdfb53753d", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/9a74c3e6c0d686c26ba2aab66d15ddb89dc139cc", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/9c25faf72d780a9c71081710cd48759d61ff6e9b", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/c9ea57c91f03bcad415e1a20113bdb2077bcf990", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-498xx/CVE-2024-49856.json b/CVE-2024/CVE-2024-498xx/CVE-2024-49856.json new file mode 100644 index 00000000000..9dc9fc23716 --- /dev/null +++ b/CVE-2024/CVE-2024-498xx/CVE-2024-49856.json @@ -0,0 +1,41 @@ +{ + "id": "CVE-2024-49856", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2024-10-21T13:15:06.353", + "lastModified": "2024-10-21T13:15:06.353", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nx86/sgx: Fix deadlock in SGX NUMA node search\n\nWhen the current node doesn't have an EPC section configured by firmware\nand all other EPC sections are used up, CPU can get stuck inside the\nwhile loop that looks for an available EPC page from remote nodes\nindefinitely, leading to a soft lockup. Note how nid_of_current will\nnever be equal to nid in that while loop because nid_of_current is not\nset in sgx_numa_mask.\n\nAlso worth mentioning is that it's perfectly fine for the firmware not\nto setup an EPC section on a node. While setting up an EPC section on\neach node can enhance performance, it is not a requirement for\nfunctionality.\n\nRework the loop to start and end on *a* node that has SGX memory. This\navoids the deadlock looking for the current SGX-lacking node to show up\nin the loop when it never will." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/0f89fb4042c08fd143bfc28af08bf6c8a0197eea", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/20c96d0aaabfe361fc2a11c173968dc67feadbbf", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/40fb64257dab507d86b5f1f2a62f3669ef0c91a8", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/8132510c915815e6b537ab937d94ed66893bc7b8", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/9c936844010466535bd46ea4ce4656ef17653644", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/fb2d057539eda67ec7cfc369bf587e6518a9b99d", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-498xx/CVE-2024-49857.json b/CVE-2024/CVE-2024-498xx/CVE-2024-49857.json new file mode 100644 index 00000000000..6fa4e1ca52b --- /dev/null +++ b/CVE-2024/CVE-2024-498xx/CVE-2024-49857.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-49857", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2024-10-21T13:15:06.447", + "lastModified": "2024-10-21T13:15:06.447", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: iwlwifi: mvm: set the cipher for secured NDP ranging\n\nThe cipher pointer is not set, but is derefereced trying to set its\ncontent, which leads to a NULL pointer dereference.\nFix it by pointing to the cipher parameter before dereferencing." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/a949075d4bbf1ca83ccdeaa6ef4ac2ce7526c5f4", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/b3322a6d6aa9bc17b395c4b38d3b97578887aa8a", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-498xx/CVE-2024-49858.json b/CVE-2024/CVE-2024-498xx/CVE-2024-49858.json new file mode 100644 index 00000000000..96f57080d46 --- /dev/null +++ b/CVE-2024/CVE-2024-498xx/CVE-2024-49858.json @@ -0,0 +1,45 @@ +{ + "id": "CVE-2024-49858", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2024-10-21T13:15:06.543", + "lastModified": "2024-10-21T13:15:06.543", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nefistub/tpm: Use ACPI reclaim memory for event log to avoid corruption\n\nThe TPM event log table is a Linux specific construct, where the data\nproduced by the GetEventLog() boot service is cached in memory, and\npassed on to the OS using an EFI configuration table.\n\nThe use of EFI_LOADER_DATA here results in the region being left\nunreserved in the E820 memory map constructed by the EFI stub, and this\nis the memory description that is passed on to the incoming kernel by\nkexec, which is therefore unaware that the region should be reserved.\n\nEven though the utility of the TPM2 event log after a kexec is\nquestionable, any corruption might send the parsing code off into the\nweeds and crash the kernel. So let's use EFI_ACPI_RECLAIM_MEMORY\ninstead, which is always treated as reserved by the E820 conversion\nlogic." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/11690d7e76842f29b60fbb5b35bc97d206ea0e83", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/19fd2f2c5fb36b61506d3208474bfd8fdf1cada3", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/2e6871a632a99d9b9e2ce3a7847acabe99e5a26e", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/38d9b07d99b789efb6d8dda21f1aaad636c38993", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/5b22c038fb2757c652642933de5664da471f8cb7", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/77d48d39e99170b528e4f2e9fc5d1d64cdedd386", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/f76b69ab9cf04358266e3cea5748c0c2791fbb08", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-498xx/CVE-2024-49859.json b/CVE-2024/CVE-2024-498xx/CVE-2024-49859.json new file mode 100644 index 00000000000..5a240472c3e --- /dev/null +++ b/CVE-2024/CVE-2024-498xx/CVE-2024-49859.json @@ -0,0 +1,37 @@ +{ + "id": "CVE-2024-49859", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2024-10-21T13:15:06.627", + "lastModified": "2024-10-21T13:15:06.627", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nf2fs: fix to check atomic_file in f2fs ioctl interfaces\n\nSome f2fs ioctl interfaces like f2fs_ioc_set_pin_file(),\nf2fs_move_file_range(), and f2fs_defragment_range() missed to\ncheck atomic_write status, which may cause potential race issue,\nfix it." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/10569b682ebe9c75ef06ddd322ae844e9be6374b", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/26b07bd2e1f124b0e430c8d250023f7205c549c3", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/7cb51731f24b216b0b87942f519f2c67a17107ee", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/bfe5c02654261bfb8bd9cb174a67f3279ea99e58", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/d6f08c88047accc6127dddb6798a3ff11321539d", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-498xx/CVE-2024-49860.json b/CVE-2024/CVE-2024-498xx/CVE-2024-49860.json new file mode 100644 index 00000000000..99b45bd6995 --- /dev/null +++ b/CVE-2024/CVE-2024-498xx/CVE-2024-49860.json @@ -0,0 +1,45 @@ +{ + "id": "CVE-2024-49860", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2024-10-21T13:15:06.723", + "lastModified": "2024-10-21T13:15:06.723", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nACPI: sysfs: validate return type of _STR method\n\nOnly buffer objects are valid return values of _STR.\n\nIf something else is returned description_show() will access invalid\nmemory." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/0cdfb9178a3bba843c95c2117c82c15f1a64b9ce", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/4b081991c4363e072e1748efed0bbec8a77daba5", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/4bb1e7d027413835b086aed35bc3f0713bc0f72b", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/5c8d007c14aefc3f2ddf71e4c40713733dc827be", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/f0921ecd4ddc14646bb5511f49db4d7d3b0829f0", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/f51e5a88f2e7224858b261546cf6b3037dfb1323", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/f51f711d36e61fbb87c67b524fd200e05172668d", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-498xx/CVE-2024-49861.json b/CVE-2024/CVE-2024-498xx/CVE-2024-49861.json new file mode 100644 index 00000000000..476469d3bbc --- /dev/null +++ b/CVE-2024/CVE-2024-498xx/CVE-2024-49861.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2024-49861", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2024-10-21T13:15:06.800", + "lastModified": "2024-10-21T13:15:06.800", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Fix helper writes to read-only maps\n\nLonial found an issue that despite user- and BPF-side frozen BPF map\n(like in case of .rodata), it was still possible to write into it from\na BPF program side through specific helpers having ARG_PTR_TO_{LONG,INT}\nas arguments.\n\nIn check_func_arg() when the argument is as mentioned, the meta->raw_mode\nis never set. Later, check_helper_mem_access(), under the case of\nPTR_TO_MAP_VALUE as register base type, it assumes BPF_READ for the\nsubsequent call to check_map_access_type() and given the BPF map is\nread-only it succeeds.\n\nThe helpers really need to be annotated as ARG_PTR_TO_{LONG,INT} | MEM_UNINIT\nwhen results are written into them as opposed to read out of them. The\nlatter indicates that it's okay to pass a pointer to uninitialized memory\nas the memory is written to anyway.\n\nHowever, ARG_PTR_TO_{LONG,INT} is a special case of ARG_PTR_TO_FIXED_SIZE_MEM\njust with additional alignment requirement. So it is better to just get\nrid of the ARG_PTR_TO_{LONG,INT} special cases altogether and reuse the\nfixed size memory types. For this, add MEM_ALIGNED to additionally ensure\nalignment given these helpers write directly into the args via * = val.\nThe .arg*_size has been initialized reflecting the actual sizeof(*).\n\nMEM_ALIGNED can only be used in combination with MEM_FIXED_SIZE annotated\nargument types, since in !MEM_FIXED_SIZE cases the verifier does not know\nthe buffer size a priori and therefore cannot blindly write * = val." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/1e75d25133158b525e0456876e9bcfd6b2993fd5", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/2ed98ee02d1e08afee88f54baec39ea78dc8a23c", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/32556ce93bc45c730829083cb60f95a2728ea48b", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/a2c8dc7e21803257e762b0bf067fd13e9c995da0", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-498xx/CVE-2024-49862.json b/CVE-2024/CVE-2024-498xx/CVE-2024-49862.json new file mode 100644 index 00000000000..409572141ca --- /dev/null +++ b/CVE-2024/CVE-2024-498xx/CVE-2024-49862.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2024-49862", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2024-10-21T13:15:06.893", + "lastModified": "2024-10-21T13:15:06.893", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\npowercap: intel_rapl: Fix off by one in get_rpi()\n\nThe rp->priv->rpi array is either rpi_msr or rpi_tpmi which have\nNR_RAPL_PRIMITIVES number of elements. Thus the > needs to be >=\nto prevent an off by one access." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/288cbc505e2046638c615c36357cb78bc9fee1e0", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/6a34f3b0d7f11fb6ed72da315fd2360abd9c0737", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/851e7f7f14a15f4e47b7d0f70d5c4a2b95b824d6", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/95f6580352a7225e619551febb83595bcb77ab17", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-62xx/CVE-2024-6207.json b/CVE-2024/CVE-2024-62xx/CVE-2024-6207.json index 6a561202639..500fdd4001e 100644 --- a/CVE-2024/CVE-2024-62xx/CVE-2024-6207.json +++ b/CVE-2024/CVE-2024-62xx/CVE-2024-6207.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6207", "sourceIdentifier": "PSIRT@rockwellautomation.com", "published": "2024-10-14T21:15:12.460", - "lastModified": "2024-10-15T12:57:46.880", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-21T13:20:45.617", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + }, { "source": "PSIRT@rockwellautomation.com", "type": "Secondary", @@ -84,6 +104,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "PSIRT@rockwellautomation.com", "type": "Secondary", @@ -95,10 +125,352 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:rockwellautomation:controllogix_5580_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "28.011", + "versionEndExcluding": "33.017", + "matchCriteriaId": "3CCECB24-3DF9-441D-B2E0-7EDD305EA31D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:rockwellautomation:controllogix_5580_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "34.011", + "versionEndExcluding": "34.014", + "matchCriteriaId": "999BE839-8688-4723-A067-788386E528D7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:rockwellautomation:controllogix_5580_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "35.011", + "versionEndExcluding": "35.013", + "matchCriteriaId": "D70BDEA5-B19E-4399-AD46-FA94285B2DEA" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:rockwellautomation:controllogix_5580:-:*:*:*:*:*:*:*", + "matchCriteriaId": "51BB883B-B863-4D57-B1C0-FC7B3EBD1EA0" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:rockwellautomation:controllogix_5580_process_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "33.011", + "versionEndExcluding": "33.017", + "matchCriteriaId": "F8EF3D88-B9BC-4FEA-BA35-8657EEE463F2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:rockwellautomation:controllogix_5580_process_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "34.011", + "versionEndExcluding": "34.014", + "matchCriteriaId": "7A3A96A6-242A-4022-8347-E04467DA6FDA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:rockwellautomation:controllogix_5580_process_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "35.011", + "versionEndExcluding": "35.013", + "matchCriteriaId": "7D377807-09D3-4430-8B0D-83BB5514B275" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:rockwellautomation:controllogix_5580_process:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AFEDADD8-01DE-4AE5-A0D7-532347FA7DB2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:rockwellautomation:guardlogix_5580_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "31.011", + "versionEndExcluding": "33.017", + "matchCriteriaId": "BF92BE9B-AF7A-4A04-9438-C30C5ED49B07" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:rockwellautomation:guardlogix_5580_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "34.011", + "versionEndExcluding": "34.014", + "matchCriteriaId": "D0E0F65D-98D1-4021-9CB0-402834F46DD8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:rockwellautomation:guardlogix_5580_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "35.011", + "versionEndExcluding": "35.013", + "matchCriteriaId": "956AF3D2-9A47-4BAD-B3A5-37A8965DBB2E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:rockwellautomation:guardlogix_5580:-:*:*:*:*:*:*:*", + "matchCriteriaId": "006B7683-9FDF-4748-BA28-2EA22613E092" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:rockwellautomation:compactlogix_5380_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "28.011", + "versionEndExcluding": "33.017", + "matchCriteriaId": "6C85E19A-8153-4AC2-8A15-DD1CEE9F5B2E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:rockwellautomation:compactlogix_5380_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "34.011", + "versionEndExcluding": "34.014", + "matchCriteriaId": "90519681-C70B-49EE-A551-29D5A9EFCA31" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:rockwellautomation:compactlogix_5380_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "35.011", + "versionEndExcluding": "35.013", + "matchCriteriaId": "3A306250-9B1A-49A4-B6C1-E2EFBA49504B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:rockwellautomation:compactlogix_5380:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EDD040ED-B44C-47D0-B4D4-729C378C4F68" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:rockwellautomation:compact_guardlogix_5380_sil_2_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "31.011", + "versionEndExcluding": "33.017", + "matchCriteriaId": "93D9D75D-0C98-408B-9EB1-6315AAE1147B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:rockwellautomation:compact_guardlogix_5380_sil_2_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "34.011", + "versionEndExcluding": "34.014", + "matchCriteriaId": "58CAFC2B-2C95-41E0-BB00-7E7F89103664" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:rockwellautomation:compact_guardlogix_5380_sil_2_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "35.011", + "versionEndExcluding": "35.013", + "matchCriteriaId": "37997377-0939-4D3C-8A97-F4F8C6FB1000" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:rockwellautomation:compact_guardlogix_5380_sil_2:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E594CDF6-0582-4D5C-B6AA-C8A2E752E29F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:rockwellautomation:compact_guardlogix_5380_sil_3_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "32.013", + "versionEndExcluding": "33.017", + "matchCriteriaId": "D85D8A23-BC23-41F9-A17A-33239D4C90B5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:rockwellautomation:compact_guardlogix_5380_sil_3_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "34.011", + "versionEndExcluding": "34.014", + "matchCriteriaId": "13C157F1-BD62-4F6A-8DCF-4660983C9948" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:rockwellautomation:compact_guardlogix_5380_sil_3_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "35.011", + "versionEndExcluding": "35.013", + "matchCriteriaId": "A01F13C3-42C1-409C-A16E-6BEC723108A2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:rockwellautomation:compact_guardlogix_5380_sil_3:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B82D842C-0930-41AA-83CD-5F235771AE4B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:rockwellautomation:compactlogix_5480_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "32.011", + "versionEndExcluding": "33.017", + "matchCriteriaId": "A890317E-B6BD-4A0A-B7E0-E50D90506EF1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:rockwellautomation:compactlogix_5480_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "34.011", + "versionEndExcluding": "34.014", + "matchCriteriaId": "881D835B-D7E3-44C5-9B77-CA82EDCE2D3C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:rockwellautomation:compactlogix_5480_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "35.011", + "versionEndExcluding": "35.013", + "matchCriteriaId": "A0ABD910-7EBE-44C8-97E3-2B523CDEE5FA" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:rockwellautomation:compactlogix_5480:-:*:*:*:*:*:*:*", + "matchCriteriaId": "80F4F5BE-07DF-402A-BF98-34FBA6A11968" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:rockwellautomation:factorytalk_logix_echo_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "33.011", + "versionEndExcluding": "34.014", + "matchCriteriaId": "02105DF7-661C-47E7-BC52-771356537783" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:rockwellautomation:factorytalk_logix_echo_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "35.011", + "versionEndExcluding": "35.013", + "matchCriteriaId": "51ECB73D-C08C-4DE1-BA75-608E9C350751" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:rockwellautomation:factorytalk_logix_echo:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7898895B-17A1-499A-9B09-9F6C1C302368" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1707.html", - "source": "PSIRT@rockwellautomation.com" + "source": "PSIRT@rockwellautomation.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-99xx/CVE-2024-9986.json b/CVE-2024/CVE-2024-99xx/CVE-2024-9986.json index e3a70785755..84c406cdaa4 100644 --- a/CVE-2024/CVE-2024-99xx/CVE-2024-9986.json +++ b/CVE-2024/CVE-2024-99xx/CVE-2024-9986.json @@ -2,8 +2,8 @@ "id": "CVE-2024-9986", "sourceIdentifier": "cna@vuldb.com", "published": "2024-10-15T13:15:11.790", - "lastModified": "2024-10-16T16:38:43.170", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-21T13:07:47.700", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -120,26 +140,63 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fabianros:blood_bank_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "074BD804-92B2-445A-9A77-DE019D9E8A13" + } + ] + } + ] + } + ], "references": [ { "url": "https://code-projects.org/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://github.com/Lanxiy7th/lx_CVE_report-/issues/16", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.280349", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.280349", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.423887", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/README.md b/README.md index 895e61fd5a6..9b01cb02a62 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-10-21T12:00:18.868091+00:00 +2024-10-21T14:00:53.794372+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-10-21T11:35:04.960000+00:00 +2024-10-21T13:55:03.510000+00:00 ``` ### Last Data Feed Release @@ -33,25 +33,69 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -266251 +266352 ``` ### CVEs added in the last Commit -Recently added CVEs: `2` +Recently added CVEs: `101` -- [CVE-2024-43945](CVE-2024/CVE-2024-439xx/CVE-2024-43945.json) (`2024-10-21T11:15:02.933`) -- [CVE-2024-47328](CVE-2024/CVE-2024-473xx/CVE-2024-47328.json) (`2024-10-21T11:15:03.393`) +- [CVE-2024-47750](CVE-2024/CVE-2024-477xx/CVE-2024-47750.json) (`2024-10-21T13:15:05.037`) +- [CVE-2024-47751](CVE-2024/CVE-2024-477xx/CVE-2024-47751.json) (`2024-10-21T13:15:05.123`) +- [CVE-2024-47752](CVE-2024/CVE-2024-477xx/CVE-2024-47752.json) (`2024-10-21T13:15:05.203`) +- [CVE-2024-47753](CVE-2024/CVE-2024-477xx/CVE-2024-47753.json) (`2024-10-21T13:15:05.283`) +- [CVE-2024-47754](CVE-2024/CVE-2024-477xx/CVE-2024-47754.json) (`2024-10-21T13:15:05.377`) +- [CVE-2024-47755](CVE-2024/CVE-2024-477xx/CVE-2024-47755.json) (`2024-10-21T13:15:05.467`) +- [CVE-2024-47756](CVE-2024/CVE-2024-477xx/CVE-2024-47756.json) (`2024-10-21T13:15:05.550`) +- [CVE-2024-47757](CVE-2024/CVE-2024-477xx/CVE-2024-47757.json) (`2024-10-21T13:15:05.640`) +- [CVE-2024-48231](CVE-2024/CVE-2024-482xx/CVE-2024-48231.json) (`2024-10-21T12:15:08.380`) +- [CVE-2024-49273](CVE-2024/CVE-2024-492xx/CVE-2024-49273.json) (`2024-10-21T12:15:08.450`) +- [CVE-2024-49293](CVE-2024/CVE-2024-492xx/CVE-2024-49293.json) (`2024-10-21T12:15:08.683`) +- [CVE-2024-49321](CVE-2024/CVE-2024-493xx/CVE-2024-49321.json) (`2024-10-21T12:15:08.893`) +- [CVE-2024-49850](CVE-2024/CVE-2024-498xx/CVE-2024-49850.json) (`2024-10-21T13:15:05.797`) +- [CVE-2024-49851](CVE-2024/CVE-2024-498xx/CVE-2024-49851.json) (`2024-10-21T13:15:05.883`) +- [CVE-2024-49852](CVE-2024/CVE-2024-498xx/CVE-2024-49852.json) (`2024-10-21T13:15:05.977`) +- [CVE-2024-49853](CVE-2024/CVE-2024-498xx/CVE-2024-49853.json) (`2024-10-21T13:15:06.083`) +- [CVE-2024-49854](CVE-2024/CVE-2024-498xx/CVE-2024-49854.json) (`2024-10-21T13:15:06.203`) +- [CVE-2024-49855](CVE-2024/CVE-2024-498xx/CVE-2024-49855.json) (`2024-10-21T13:15:06.270`) +- [CVE-2024-49856](CVE-2024/CVE-2024-498xx/CVE-2024-49856.json) (`2024-10-21T13:15:06.353`) +- [CVE-2024-49857](CVE-2024/CVE-2024-498xx/CVE-2024-49857.json) (`2024-10-21T13:15:06.447`) +- [CVE-2024-49858](CVE-2024/CVE-2024-498xx/CVE-2024-49858.json) (`2024-10-21T13:15:06.543`) +- [CVE-2024-49859](CVE-2024/CVE-2024-498xx/CVE-2024-49859.json) (`2024-10-21T13:15:06.627`) +- [CVE-2024-49860](CVE-2024/CVE-2024-498xx/CVE-2024-49860.json) (`2024-10-21T13:15:06.723`) +- [CVE-2024-49861](CVE-2024/CVE-2024-498xx/CVE-2024-49861.json) (`2024-10-21T13:15:06.800`) +- [CVE-2024-49862](CVE-2024/CVE-2024-498xx/CVE-2024-49862.json) (`2024-10-21T13:15:06.893`) ### CVEs modified in the last Commit -Recently modified CVEs: `4` +Recently modified CVEs: `431` -- [CVE-2021-42142](CVE-2021/CVE-2021-421xx/CVE-2021-42142.json) (`2024-10-21T11:35:00.650`) -- [CVE-2023-47746](CVE-2023/CVE-2023-477xx/CVE-2023-47746.json) (`2024-10-21T11:35:02.647`) -- [CVE-2024-0772](CVE-2024/CVE-2024-07xx/CVE-2024-0772.json) (`2024-10-21T11:35:03.773`) -- [CVE-2024-23208](CVE-2024/CVE-2024-232xx/CVE-2024-23208.json) (`2024-10-21T11:35:04.960`) +- [CVE-2023-4049](CVE-2023/CVE-2023-40xx/CVE-2023-4049.json) (`2024-10-21T13:55:03.510`) +- [CVE-2023-4050](CVE-2023/CVE-2023-40xx/CVE-2023-4050.json) (`2024-10-21T13:55:03.510`) +- [CVE-2023-4054](CVE-2023/CVE-2023-40xx/CVE-2023-4054.json) (`2024-10-21T13:55:03.510`) +- [CVE-2023-4055](CVE-2023/CVE-2023-40xx/CVE-2023-4055.json) (`2024-10-21T13:55:03.510`) +- [CVE-2023-4056](CVE-2023/CVE-2023-40xx/CVE-2023-4056.json) (`2024-10-21T13:55:03.510`) +- [CVE-2023-4573](CVE-2023/CVE-2023-45xx/CVE-2023-4573.json) (`2024-10-21T13:55:03.510`) +- [CVE-2023-4574](CVE-2023/CVE-2023-45xx/CVE-2023-4574.json) (`2024-10-21T13:55:03.510`) +- [CVE-2023-4575](CVE-2023/CVE-2023-45xx/CVE-2023-4575.json) (`2024-10-21T13:55:03.510`) +- [CVE-2023-4576](CVE-2023/CVE-2023-45xx/CVE-2023-4576.json) (`2024-10-21T13:55:03.510`) +- [CVE-2023-4581](CVE-2023/CVE-2023-45xx/CVE-2023-4581.json) (`2024-10-21T13:55:03.510`) +- [CVE-2023-4584](CVE-2023/CVE-2023-45xx/CVE-2023-4584.json) (`2024-10-21T13:55:03.510`) +- [CVE-2023-6450](CVE-2023/CVE-2023-64xx/CVE-2023-6450.json) (`2024-10-21T12:35:05.010`) +- [CVE-2024-0716](CVE-2024/CVE-2024-07xx/CVE-2024-0716.json) (`2024-10-21T12:35:06.143`) +- [CVE-2024-10021](CVE-2024/CVE-2024-100xx/CVE-2024-10021.json) (`2024-10-21T13:13:25.677`) +- [CVE-2024-10022](CVE-2024/CVE-2024-100xx/CVE-2024-10022.json) (`2024-10-21T13:14:02.203`) +- [CVE-2024-10023](CVE-2024/CVE-2024-100xx/CVE-2024-10023.json) (`2024-10-21T13:14:37.300`) +- [CVE-2024-10024](CVE-2024/CVE-2024-100xx/CVE-2024-10024.json) (`2024-10-21T13:15:01.730`) +- [CVE-2024-21172](CVE-2024/CVE-2024-211xx/CVE-2024-21172.json) (`2024-10-21T12:59:49.070`) +- [CVE-2024-43167](CVE-2024/CVE-2024-431xx/CVE-2024-43167.json) (`2024-10-21T12:15:03.837`) +- [CVE-2024-43168](CVE-2024/CVE-2024-431xx/CVE-2024-43168.json) (`2024-10-21T12:15:04.327`) +- [CVE-2024-45071](CVE-2024/CVE-2024-450xx/CVE-2024-45071.json) (`2024-10-21T13:41:29.383`) +- [CVE-2024-45072](CVE-2024/CVE-2024-450xx/CVE-2024-45072.json) (`2024-10-21T13:41:20.463`) +- [CVE-2024-47669](CVE-2024/CVE-2024-476xx/CVE-2024-47669.json) (`2024-10-21T13:28:34.330`) +- [CVE-2024-6207](CVE-2024/CVE-2024-62xx/CVE-2024-6207.json) (`2024-10-21T13:20:45.617`) +- [CVE-2024-9986](CVE-2024/CVE-2024-99xx/CVE-2024-9986.json) (`2024-10-21T13:07:47.700`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 82736bb1a32..e7ccfe21cb9 100644 --- a/_state.csv +++ b/_state.csv @@ -49733,7 +49733,7 @@ CVE-2011-3058,0,0,2ed2166f33220c201772bc407227eda93aa6ddaa5c001ae9c45569a08e740d CVE-2011-3059,0,0,18d222fb385a3ab6f0e943f7881edf659ecc46ed27715204f32838342efc4dd0,2020-04-14T15:16:52.577000 CVE-2011-3060,0,0,8319a017663023bc025fd4b93d9ee5f70f2d62ae76db1032353765a2b22b6dd5,2020-04-14T15:16:26.653000 CVE-2011-3061,0,0,00980758f3888c3c0d06a5138813795faab5669fcefdbb8f55f0439e1df9df5d,2020-04-14T15:13:32.660000 -CVE-2011-3062,0,0,ab73d2f3b22a326be046a8cc90954d03d04b389bc4f2e6953085473c2d0a726c,2020-04-14T15:12:58.080000 +CVE-2011-3062,0,1,03248a8aad4f48b5269ab0c0aa49878e72df7e79e4b40421d6cdb279cd7c574d,2024-10-21T13:55:03.510000 CVE-2011-3063,0,0,8862f35ed996fb9ceb9b5ff3e6c304a57ad06ed83b24b087602414d215c7cc20,2020-04-14T15:12:09.343000 CVE-2011-3064,0,0,fbb1dc78b4a29a92baeb61c2321475e08dea67891ca83049c66d1aedab8c5e12,2020-04-14T15:10:16.727000 CVE-2011-3065,0,0,7bf7a87483421b7ad9ed69ba6748ce94dcac4fe8240fe53ca784e1f50d2de348,2020-04-14T15:11:09.137000 @@ -52211,7 +52211,7 @@ CVE-2012-0434,0,0,fe11f1b9412f73a8ba3e9657db409c106455785b956ede2b9965016f7e2fe7 CVE-2012-0435,0,0,ea4dc0b8f75e2c93fd211b80d1e9814edd7b4c3677b46b29add1cfd680f75089,2013-01-28T05:00:00 CVE-2012-0439,0,0,a459ebcbeabb41907cb0de05670f8a80d7784105a9a6cb4a4c43f7e8934bbd51,2013-02-25T05:00:00 CVE-2012-0440,0,0,839733946b2942be1a7be185390a41e7e61177227878d6da241774da8bbe5db5,2017-08-29T01:30:55.647000 -CVE-2012-0441,0,0,7fa78476bf4da15ecd49904fc86db058622e477015a6d7709b38b501b6dd2289,2018-01-18T02:29:03.600000 +CVE-2012-0441,0,1,90a472d07b1f31c2d6d7aa25cac4a78917ea30f5894db3fa286104be2584243d,2024-10-21T13:55:03.510000 CVE-2012-0442,0,0,187acc54ec66bb974c82e4058b4b4f75b4761dde44b6f7b9144bb9f5f1bedd2f,2020-08-28T13:11:07.790000 CVE-2012-0443,0,0,8964bc3b76ef978414f3257fc41bbc521592638f3ddb4e569d9373b81c3f663f,2017-09-19T01:34:32.587000 CVE-2012-0444,0,0,0e0829ea4203da7eb26114f71bd8ffe2f50b2e555da1c9d8e5a684dcb8d99f4e,2020-08-28T13:12:55.027000 @@ -52221,34 +52221,34 @@ CVE-2012-0447,0,0,1b85799019a7995f3523252c8abc61d6855c123f1d556cd82a9db71d3d57f2 CVE-2012-0448,0,0,6546ca67318680261e5318342759f5a7d15c25c7f26d612ea648213541b5f94e,2017-08-29T01:30:56.210000 CVE-2012-0449,0,0,d5963acef7db338c02f9ae751e3518a465417f3544e29395bb7cd529c23f9d74,2020-08-28T13:14:11.963000 CVE-2012-0450,0,0,2dff629297f65bc8c1fad584ff888b6d74601aaae75f1a8f641574ed65daa45e,2017-09-19T01:34:33.167000 -CVE-2012-0451,0,0,032b6bee0cfaee2d774d8c3db6aa8fe362ba3c539d8529048ea620decad282ec,2018-01-18T02:29:03.770000 +CVE-2012-0451,0,1,d102cee94e7b4ae3e0fa7d4a186c0b6e5101e347cf45bf542b8cc50b506b38f3,2024-10-21T13:55:03.510000 CVE-2012-0452,0,0,8fc21a8f9ffafe7707bbd7d2d9ceac85dc97dbc4da93819364faa188b08040af,2018-01-10T02:29:24.037000 CVE-2012-0453,0,0,4eb81232bcc2ba03a1498eb74744b779677505d5430b849e2aabe33ef92bb910,2018-01-11T02:29:01.670000 -CVE-2012-0454,0,0,b82b1c900b1e100b94477b9a620faa1e8cc1b7bbfa5f4030db6907403b8bbaea,2018-10-30T16:27:21.030000 -CVE-2012-0455,0,0,e58de3f83fc4d92377c26ef2998a3a53504a2f79e98fec073049f1e25a440df5,2018-01-18T02:29:04.207000 -CVE-2012-0456,0,0,38f41c922b7489bbb0e308a469c8793e110d5ceebf91a76f20442384ab3c0999,2018-01-18T02:29:04.397000 -CVE-2012-0457,0,0,463e4e0d314b8013b5d985ace5b6d533f0f3e8c1d6b7927f28d1edd8d0b4f355,2018-01-18T02:29:04.567000 -CVE-2012-0458,0,0,e5057b6da346a7591d34b5e4f88f01a4331325595c392b8d56959be2b47af5c8,2018-01-18T02:29:04.770000 -CVE-2012-0459,0,0,2f6bfdbf2924751da42f67ec9c1aff139ea16ade9c807916d9e8568b691effb9,2018-01-18T02:29:05.007000 -CVE-2012-0460,0,0,c98bdcde46c6b7011877bfb7b0ecb493f5365ee5f78270cc9b1a15cffd3af2e4,2018-01-18T02:29:05.177000 -CVE-2012-0461,0,0,40bcbf54ac569e70c618729ab28a7ab052ad251584b77586c52d06f22bab921d,2018-01-18T02:29:05.380000 -CVE-2012-0462,0,0,0c1211f3a39a3ea88154fe3edc033c82e50bf0894a2b1fed942ee2c239154d17,2018-01-18T02:29:05.567000 -CVE-2012-0463,0,0,820a75079b3b8d8b2a3ac942bd68e113e53e4e000914014ee4d08077bdfee34e,2018-01-11T02:29:03.077000 -CVE-2012-0464,0,0,910bd695c120eaa63186c387c107083c4d00957caed491ce9cea0303f4ffdafe,2018-01-18T02:29:05.757000 +CVE-2012-0454,0,1,b174077e1b54c330ef7fd24f3fc4061c88195cc5ee224e4bbfc44ae62e20173f,2024-10-21T13:55:03.510000 +CVE-2012-0455,0,1,5f1eab14725944a133ca19dd191d0ed0558a3a36b8aca6c7d44a41e03d17faf4,2024-10-21T13:55:03.510000 +CVE-2012-0456,0,1,9154b8a9fe4be088b16912071f0063b470e2f5a1515e3d1758b0941fc4089ae3,2024-10-21T13:55:03.510000 +CVE-2012-0457,0,1,fa6173cf6a6d451c53e84dbbd42419ade18327697c4278925c73105fcc879d8a,2024-10-21T13:55:03.510000 +CVE-2012-0458,0,1,098b6ecb4be3534103899f0ae43586f458b6a9562b38aea3a00c8621624da17c,2024-10-21T13:55:03.510000 +CVE-2012-0459,0,1,52bb352716aadcfa5dcc8732e8bed5838b379ec9661d2d557e5fa31864c0fca9,2024-10-21T13:55:03.510000 +CVE-2012-0460,0,1,235fa954ab022f4ee322f58d4593677105885d4cfae9d2caea99f88f06bac13e,2024-10-21T13:55:03.510000 +CVE-2012-0461,0,1,4451e5ba52d6327761a386d6e29ffeb67edeb142ba7ba9f4414af9f3576a4d83,2024-10-21T13:55:03.510000 +CVE-2012-0462,0,1,e21ab242995793a4186fbfed925802e662160450893bd03e0164a5cc49c8a0f3,2024-10-21T13:55:03.510000 +CVE-2012-0463,0,1,171ee3fae7aa7dfa8730d2e5fd17af49f52b4d83208d5ac61a8993c5b665f7e9,2024-10-21T13:55:03.510000 +CVE-2012-0464,0,1,135a2e04dbf22b3710dcc9d5bb97339ec63a070f70d0a1fc484346b7cc98e719,2024-10-21T13:55:03.510000 CVE-2012-0465,0,0,69959fb8fa6bc00cd4927096b593510a9ac2bbc39e719bbdb3e2364074b80bf6,2012-08-14T03:34:05.847000 CVE-2012-0466,0,0,6ff146b79c22be15ded4c6f83ee3cbb8f789ac09b61a24ea3534a99a95fafd83,2012-08-14T03:34:06.020000 -CVE-2012-0467,0,0,23dc0ebaa2c7a47a1ab482e7f3c1b9f0fd886c83058477b15388497689e0ef0e,2018-01-18T02:29:06.007000 +CVE-2012-0467,0,1,4789ea375591357d3c70cbaddbaded3e4fe16a3e642037f5b2893b185f1f1521,2024-10-21T13:55:03.510000 CVE-2012-0468,0,0,ac60591307744669c9b53bff97fbe83a2b03f711f54bb3cfd2e79a2c433d1702,2017-12-29T02:29:07.237000 -CVE-2012-0469,0,0,a217fc9673d954809b80d16d8738954e38975a94543b79a6b50e1696c3080eac,2017-12-29T02:29:07.360000 -CVE-2012-0470,0,0,ec837aefe6bf72e8c66ab19b18da4de97ba98d670a58aa670080334ef8868313,2018-01-18T02:29:06.177000 -CVE-2012-0471,0,0,948eadb1a3be9fa503459fc02abb70584ffbab1222c0cad46038bd7d5aea910d,2018-01-18T02:29:06.350000 -CVE-2012-0472,0,0,d99adca3079e94f651cefeec5890ea1d081e52ebbd63685da2c5c9ad97115182,2017-12-29T02:29:07.753000 -CVE-2012-0473,0,0,9ba2994e3b8d4860d12836886b4999ee9b94997316345bd0bbcf615978b6f48f,2017-12-29T02:29:07.893000 -CVE-2012-0474,0,0,48962f4986f826f8a532c9762112b799e5f2591d5d8d323c46f68c9ad0cbd4ab,2017-12-29T02:29:08.003000 +CVE-2012-0469,0,1,cdb4db69286d217f1605ae217e742a99f526faab1a07fd4b05e3df47f698d564,2024-10-21T13:55:03.510000 +CVE-2012-0470,0,1,4651978f3bcf81299a7d4af44981701c474a41cb557c88bb4ce36c7e486beaf7,2024-10-21T13:55:03.510000 +CVE-2012-0471,0,1,0ccabceb0b2c69e1ae85bea4bc655eaae0455e873e8d9a96ba2c38aa82e18e14,2024-10-21T13:55:03.510000 +CVE-2012-0472,0,1,560260135c05723dc5494230cdd05237d6fa4ee678a6117a0486a8e96b1a7083,2024-10-21T13:55:03.510000 +CVE-2012-0473,0,1,9e6668126d8fe114ea21e02fcc7b5063b3b9ea68825e8f352fccc4bee6b64b13,2024-10-21T13:55:03.510000 +CVE-2012-0474,0,1,af7e92cce9504184e6090e4756281d1f944faf6324923473203e89df14adf7cd,2024-10-21T13:55:03.510000 CVE-2012-0475,0,0,d7152190d71aa2f129cfc81e1598fd9b999a7de247f81704d9611e0ecc676613,2017-12-19T02:29:38.847000 -CVE-2012-0477,0,0,cb269be1f6e441c066e30b2d6c913adb70a6c9d57fd1696bb973214e108aee73,2018-01-18T02:29:06.537000 -CVE-2012-0478,0,0,6013e88fe5f930cccaab7c2d84fc8784451fcaaf90d9d9e98cda8d516f9bb750,2017-12-29T02:29:08.267000 -CVE-2012-0479,0,0,df148bfb8ccea040e91ce799a767e19f646e31bb51e924623289adac9675b575,2018-01-18T02:29:06.757000 +CVE-2012-0477,0,1,baf2cbd278ed051840fb0c037e78f23e300d3fac81d16314854093750bf280e1,2024-10-21T13:55:03.510000 +CVE-2012-0478,0,1,75388cf80facb62e685c258b746b19b21dc51c023c7955a3163b9d13d97795c0,2024-10-21T13:55:03.510000 +CVE-2012-0479,0,1,a5626e329159d4a677ccc5396438c38666549c08d0031ae67fb50e26372b3903,2024-10-21T13:55:03.510000 CVE-2012-0484,0,0,b50bd30a356316fa33e6a5984ed9eb7d677cc3712b0364718bf4f59a820cbb48,2019-12-17T20:26:08.287000 CVE-2012-0485,0,0,64141e646532eac66ddd495426d403a1bf3a1a0b004129d475ad91c6d070681f,2019-12-17T20:23:43.220000 CVE-2012-0486,0,0,b01d5ad909ba861d0a810fb3a721e8e087a90262d16cb38d192e4b98ceed65e5,2019-12-17T15:24:15.790000 @@ -53578,46 +53578,46 @@ CVE-2012-1933,0,0,e5cb9f7b788c58bf65618f403488d4892b39e99ff614f6f16923aa5e3e7132 CVE-2012-1934,0,0,3d77d434f061d5d4893f5ce6d87f60cc9b4027decdb50523fef2cc700da18a6c,2017-08-29T01:31:26.743000 CVE-2012-1935,0,0,67fdc9bf69d66eb297deb2b6a2563f3e23e2a32f8ab94ada4cb446f71ff263bc,2017-08-29T01:31:26.803000 CVE-2012-1936,0,0,20d8cb872a73f37b52fd8424f3ec27633c1fc2576e52c705a1be4f3e4b49f210,2024-08-06T20:15:17.180000 -CVE-2012-1937,0,0,3f23d988fbf336406c3c31e63e944f80a8c995996983991edd02161a932d1fff,2018-01-05T02:29:30.180000 +CVE-2012-1937,0,1,de1049e560f0ee9c2794f1099d98dd4264a3d322464c265fad9b6109354c3350,2024-10-21T13:55:03.510000 CVE-2012-1938,0,0,baf307ef85ec8d7e4d610357e0b2738a2382c4a807dd5bdc5d5513f2c610aeaf,2020-08-28T13:20:36.753000 -CVE-2012-1939,0,0,cfa6b835e7a13315ff94db3c5e5ec2731713c9c0a3e25acaad30f3146fce2dcd,2017-12-29T02:29:14.597000 -CVE-2012-1940,0,0,0416e0db64686a5e98effc21fc56a95f5a457e29aec6762b46b4d2ac4219fd51,2018-01-05T02:29:30.290000 -CVE-2012-1941,0,0,711cad5152cbbbe2f0a9de20f92de92edfaf6d47abc4870914dd1510a185e579,2017-12-29T02:29:14.817000 +CVE-2012-1939,0,1,8db719f3d51ccc62cf11c27e6fc1c19f31cc3e64045d582df3b1b8ec3ea85223,2024-10-21T13:55:03.510000 +CVE-2012-1940,0,1,f337a899190f22436fbe3dec46901ecb9132a265fc21254c879a3b0fd520b40c,2024-10-21T13:55:03.510000 +CVE-2012-1941,0,1,614e1d023c2e525c81d0f3701c3880195558a2bb20c48b4d3e2b709744d197ba,2024-10-21T13:55:03.510000 CVE-2012-1942,0,0,abfd00d224fec42d73e42e6affcfde543ad7490367829c886d24efc4d80edbb0,2017-12-29T02:29:14.923000 CVE-2012-1943,0,0,49998420f7ad263e5ded328ba5e7ceaffeb63f24e8a97877cffce9fa7f75143e,2017-12-29T02:29:14.987000 -CVE-2012-1944,0,0,e1f19041311060ef4bd30ac9fb443dd1462661272c41f95093f66490d55b4472,2017-12-29T02:29:15.080000 -CVE-2012-1945,0,0,207c34bb0163a12fbd177c0f39e5d9fe752445f1247c2feb44a9c8432a5b168f,2017-12-29T02:29:15.207000 -CVE-2012-1946,0,0,ff5f4bd6df1c9f97792ba91718c9a9552776042de500ebdd47093185e68070a6,2017-12-29T02:29:15.330000 -CVE-2012-1947,0,0,acb7e57f54eca23f49967499f0b19f8ac535afad6f448376ce0e6e5883412f17,2018-01-05T02:29:30.397000 -CVE-2012-1948,0,0,0942afa8820b72f3a00afe4ad5191600f5f0604020e7410a64fa35f1a02fac91,2017-12-29T02:29:15.613000 +CVE-2012-1944,0,1,79546a5991f31ceabe053d159c80ef3e6ba1101fe8de95010657553199feb79f,2024-10-21T13:55:03.510000 +CVE-2012-1945,0,1,5aa6c0f0e840f30c0bfd4ca540d5778d46bf75e6b80bf82a41c18e516cb90091,2024-10-21T13:55:03.510000 +CVE-2012-1946,0,1,0f2410a7f5ec66dcb746e125a0e0ca7901fe642fe579d02b9ae4c7c614ed7e50,2024-10-21T13:55:03.510000 +CVE-2012-1947,0,1,bdb727d192f66967b5211d0e4e0d478c59a4dec8aeac0693c110bfd8af3ffcb0,2024-10-21T13:55:03.510000 +CVE-2012-1948,0,1,46ffa60cf78c041378bc09b12db9e51369f95e4335e57e959a48e4b7fc6e4a3d,2024-10-21T13:55:03.510000 CVE-2012-1949,0,0,0f88603d5b42864c7dbd11ebc4e637a86ae921374692b371c771e58e33eff3ce,2017-12-29T02:29:15.783000 -CVE-2012-1950,0,0,8800f4217b570fa9e46b8ab384335e7aa6e5b012785887496581b15a93d916b6,2017-12-29T02:29:15.893000 -CVE-2012-1951,0,0,287c8b195f6ce772b46faa0ee797cd441a16d2d95b334579ade3c3f6b23f0814,2017-12-29T02:29:16.017000 -CVE-2012-1952,0,0,fd082bb326afdc35fe323ff8af95a95b85c6bb0f6c4cd450408cfd474e762a3a,2017-12-29T02:29:16.220000 -CVE-2012-1953,0,0,dfccd6baa26ea049d33efa5fcb876fc49973f65d6dd384d9cbe1beece420c5a2,2017-12-29T02:29:16.377000 -CVE-2012-1954,0,0,6e85299fbfe586e212032b9e6be8efc3ff523222a1e36eb169dbf99a97067836,2017-12-29T02:29:16.550000 -CVE-2012-1955,0,0,df6d05c3cdc64b31bb0dd1941954149ad51a95d1348d8add903ec23596b67e08,2017-12-29T02:29:16.720000 +CVE-2012-1950,0,1,c8c92fb92755b8f794bdde444d037768c8552d4b1f93f51a34c10d168d7e90c0,2024-10-21T13:55:03.510000 +CVE-2012-1951,0,1,558ea3c17d31dec9609580ec67c292deca671a0f2b6a2d094909d2cdfd859204,2024-10-21T13:55:03.510000 +CVE-2012-1952,0,1,d18f75ab7e4e28a1b9277d86c039195fe2c3227034eba8f8d06364a3c5551376,2024-10-21T13:55:03.510000 +CVE-2012-1953,0,1,cd99a2ea4edfef66869b374c51b72d0aee493fe90aacce95d9368c62943bd81a,2024-10-21T13:55:03.510000 +CVE-2012-1954,0,1,f976359acf59280ea0a970fbaf642200f74fec6c8f62c1f63a32f89aec04f7df,2024-10-21T13:55:03.510000 +CVE-2012-1955,0,1,66565e6853c469a65158db118b0c782d3db9ab82c36bf5a5b1ae106d00dd6339,2024-10-21T13:55:03.510000 CVE-2012-1956,0,0,747f233d876ee605fe8fef2e1268e5debfe5779407d15a3c06edc4ea81da482d,2017-09-19T01:34:54.183000 -CVE-2012-1957,0,0,522ca1ba97f90139af8720709ac8de24ebb30c2b32632980e3f4ee7d6a30aef2,2017-12-29T02:29:16.877000 -CVE-2012-1958,0,0,544f014cdc86d51953628fcdac85c47a6bd1809780a25555d2d5959198faab5d,2017-12-29T02:29:17.050000 -CVE-2012-1959,0,0,c1135d8a273f83253c79153cb80928b3157a40d1d695a5fe17e67167d4998ee1,2017-12-29T02:29:17.220000 +CVE-2012-1957,0,1,a287ed0aff3a0396b30f8281107080078d0777324c4c283c534b04408242b724,2024-10-21T13:55:03.510000 +CVE-2012-1958,0,1,55f183024ae31679571dacffbb6376d7e86a7a37e14b2858ee455265ffe19165,2024-10-21T13:55:03.510000 +CVE-2012-1959,0,1,bb27208fe4c99b37de426c36620f89bb7bd76e3f119d4f6086afa61fdb8b7a7e,2024-10-21T13:55:03.510000 CVE-2012-1960,0,0,b462a228a5ccf6f0cdcaa623decc429dffbf6763bd0ee661f8cd67729152e84c,2017-12-29T02:29:17.363000 -CVE-2012-1961,0,0,98d12ad4a714d8870969e01a1b3e773d4e772a41c34b165f57fb3f07e444e29e,2017-12-29T02:29:17.517000 -CVE-2012-1962,0,0,53ebe98290e862caf41c045f70fe2457de9e9117a3728a214743f934ad294ad8,2017-12-29T02:29:17.673000 -CVE-2012-1963,0,0,23096da2a4ae5940be05853c6436c75a98db3eb19ced37ee758e39e9c95be21c,2017-12-29T02:29:17.830000 -CVE-2012-1964,0,0,c36f6301ac879be4710ae2b1e56811123ed75d0386dd0215bd7f32853a571fca,2017-12-29T02:29:17.970000 -CVE-2012-1965,0,0,8f790c46e2dd60d667e941183a435670cec0884d808e13c0fceb037bde13768c,2017-12-29T02:29:18.080000 -CVE-2012-1966,0,0,0d007e689ae8a89f59a2b3e6cea5a80385ea424765a9c6e895104fad808d5514,2017-12-29T02:29:18.160000 -CVE-2012-1967,0,0,fef90b8998ebac683f4de36d0615b99a7e4e50ac026fbe80d946401a8a8d54d5,2017-12-29T02:29:18.300000 +CVE-2012-1961,0,1,91f3dc45b0043a20a145f1939f0830642b759763fa3fe4757eb9223412a8fe4d,2024-10-21T13:55:03.510000 +CVE-2012-1962,0,1,f66d89f86d60f13f65d8afb76ae912353227b1fa4ba7edfd89e3e51936fd2e41,2024-10-21T13:55:03.510000 +CVE-2012-1963,0,1,a714a4e8170529f80d84c0231cc102f053eb2a8ad040c4c10cec8b7427495ddb,2024-10-21T13:55:03.510000 +CVE-2012-1964,0,1,85358402e0ae4e2fbee3bda40481b03564681c55adffdbc82d1a56894194013b,2024-10-21T13:55:03.510000 +CVE-2012-1965,0,1,889570b02dc5ba8eff4f6d40cefb7d614fde9047ee47b591ccdeeda26bf9523c,2024-10-21T13:55:03.510000 +CVE-2012-1966,0,1,6c92cb7c53f8ad1e83a6b37d40e169857a26ee64ce1e5d83f0004c32ad3faf6f,2024-10-21T13:55:03.510000 +CVE-2012-1967,0,1,12dbdb5df1710faff0536f36a1175f886ebe4997951315231d272bf56a66d492,2024-10-21T13:55:03.510000 CVE-2012-1968,0,0,27ebe73883142f072af598560566ec29c207588bb004b9a5c64972f3a5465d11,2013-10-03T18:50:03.497000 CVE-2012-1969,0,0,9e5be1a5b1b80b43a5a94ce968fccf491fbefda7c3064654a7220f8aab35a2e5,2013-12-13T04:59:06.353000 -CVE-2012-1970,0,0,5d84c2c8e9b97511a737060f236a8a37304f6ba62b73110a137d230a17593251,2020-08-28T13:30:51.240000 +CVE-2012-1970,0,1,575740265534935c807eaf3eceacfe433fcb58787a72cf057d65361061793811,2024-10-21T13:55:03.510000 CVE-2012-1971,0,0,3a5d1c8c0eab621d9d12a4969c3684daee4494a5e867c5fe31a097f8cfc0da49,2017-09-19T01:34:55.543000 -CVE-2012-1972,0,0,55db8f726060ab316bdaee33e51bf2588feb58475edb339c748be1d918378ac7,2020-08-28T13:33:39.967000 -CVE-2012-1973,0,0,cdb0023a6a03c9323463c4b161bf9836cf50e93d13c4aed6b7b22a830d3a7c0d,2020-08-26T20:35:28.497000 -CVE-2012-1974,0,0,2f90cf5af66b88313beceb74453edbde303193177dab4b9f7b4dde90deec8bcf,2020-08-26T20:36:00.107000 -CVE-2012-1975,0,0,d15ce8c29178312788e2e1cd1d441166704aee49c4db9e4b0a607bb9a9520036,2020-08-28T13:44:00.877000 -CVE-2012-1976,0,0,08310a4d6536016bfd7b2a8f2633c460d15a5373388b65873033932e2cc33f3a,2020-08-26T20:36:27.437000 +CVE-2012-1972,0,1,cd48042d1c48e15f25efb8e997cc01ae7e0e441014c8756c3dd801faacf48565,2024-10-21T13:55:03.510000 +CVE-2012-1973,0,1,5c26f8725146cf51aaf77a28a3c2a60128cfbd3287193d1a7bec86b8ca7e399e,2024-10-21T13:55:03.510000 +CVE-2012-1974,0,1,44e236705937c8631ddd8908ef81dc3ade336bae51495938146c2f1615c7e8e1,2024-10-21T13:55:03.510000 +CVE-2012-1975,0,1,52ec3957fbf48a78754b637564dd09525acd0bd9a682b0b4ce2b4068d960a269,2024-10-21T13:55:03.510000 +CVE-2012-1976,0,1,3a321fe95b18f179e0c6fe7ea897ded784908ac6d012eb5086e39c2080d09f8d,2024-10-21T13:55:03.510000 CVE-2012-1977,0,0,b9ffb51a1189bcd61112770425614b1036fb58755df82fed7ea9cce480f04457,2012-08-29T04:00:00 CVE-2012-1978,0,0,165189a096b645e311ce6643a1bcf576089a1cae147ba652858ef3ae3e0992dc,2015-07-27T15:58:42.447000 CVE-2012-1979,0,0,284d6fdf657e2621ddf143a2b4934cb432114b5f7dad5a54c18c1ec131fd9f28,2017-08-29T01:31:26.867000 @@ -54585,7 +54585,7 @@ CVE-2012-3088,0,0,98f34e2520111ae27f781bd7a6e6dbde7feb2141b9ebdd404bb00a42e2a820 CVE-2012-3094,0,0,5a8e20ecb4a3eaf1c4a5c0804afb14054e9053017000c1c1bf5b55c142cd4264,2017-08-29T01:31:47.837000 CVE-2012-3096,0,0,40921adf55274f371fd65641bf69c8a8b5713c0bd6a0122f203dca8613d2bf83,2017-08-29T01:31:47.900000 CVE-2012-3104,0,0,563a33e257c8753e4805bbd884a8558e12339b5e201f89353ea70b478543cd87,2023-11-07T02:11:30.563000 -CVE-2012-3105,0,0,ab13cc53980ad88ba9f102b8882414756ca8bf9c3abb26ca6c2e16b0fb7a4b8b,2017-09-19T01:35:04.933000 +CVE-2012-3105,0,1,7e2247e882baaf14d84990ee45c1db83091edf18216e47de1b269db29bb30718,2024-10-21T13:55:03.510000 CVE-2012-3106,0,0,a83b8ee714f4835e115d61f59a7c972596bd0ee80f5deebea639e043f23b988a,2018-10-12T22:03:14.267000 CVE-2012-3107,0,0,529fbf312b0fc36171f037073895ac44ee0b5e22e66f6cb96499cdf30e3b6c98,2018-10-12T22:03:15.420000 CVE-2012-3108,0,0,c3697f228f8742f81fd37122c06c9b43b24aadda8bd246969fb26985a1ded214,2018-10-12T22:03:16.687000 @@ -55350,46 +55350,46 @@ CVE-2012-3952,0,0,02550acc77feaaf330c48c89f7b4d6aceda3c12a924d7daf9757616934360a CVE-2012-3953,0,0,532767e61eed2fcfdbc3e69afef361554b57b75036f3c2a00a1613398403376d,2017-08-29T01:32:07.260000 CVE-2012-3954,0,0,34e351e7f97e57f1328fe3c821d57d9a8b965c10ecc4e82a7a94460faa1d0c06,2020-04-01T13:59:57.067000 CVE-2012-3955,0,0,2be6b239b58800858bef46036ac2496e9dbfe83e14c2c6b490811ce2c2c3d99b,2020-01-08T17:16:40.980000 -CVE-2012-3956,0,0,ecebbb0b8cdcbc5e01e1e8ba4f0ae1de87e06a31ef56edc70e0daeab9d4c1642,2020-08-28T14:09:53.047000 -CVE-2012-3957,0,0,68ac25ac76874674178e4dd2764cc3d0b9e1fdfd46e15bf52cca178783f247dc,2020-08-28T14:12:39.897000 -CVE-2012-3958,0,0,5d6e4108d6a448baef79d669f557dcee63edd35053d58fb101b92239d307f2a8,2017-09-19T01:35:11.807000 -CVE-2012-3959,0,0,c2fb11cfee0ec238f0447b5be16dc5e29f95a00ff99763af3409f71fcafd0946,2020-08-26T20:36:57.173000 -CVE-2012-3960,0,0,7c23aa5ccaff2d0cb70982793bc7e9344caf07f58758e0a3133ba1c984070942,2020-08-26T20:37:28.830000 -CVE-2012-3961,0,0,bcea9951e16665fc40cd9e7eac85ed6bc0c149a2dcaf5bd84a2cbb5aeb718fab,2020-08-28T14:23:18.687000 -CVE-2012-3962,0,0,60356c0d6f48f0164e63903dd7cf128840a2955c7f2c3d3ba059516b93c707ec,2017-09-19T01:35:12.293000 -CVE-2012-3963,0,0,6ca965433daed872e9dee1986b1f5eb33b1ce9d78fee252f09f6adadcadbf33a,2020-08-26T20:38:19.863000 -CVE-2012-3964,0,0,41d81fa1934d534508a13d8c824660db688dd281fc4b9473c36d558b59865427,2017-09-19T01:35:12.557000 +CVE-2012-3956,0,1,ef54e2299cda7a2731736250b15f4aa75a1364ceeb1df2f1045599ae1b32ea39,2024-10-21T13:55:03.510000 +CVE-2012-3957,0,1,a07fd433edc8e177d652a2c5ae099f31918c560d5057913139a2497580db72b8,2024-10-21T13:55:03.510000 +CVE-2012-3958,0,1,d25788c0fab6e711a6889e354f8c710d0776aa8b542ecf137e33f52de1109632,2024-10-21T13:55:03.510000 +CVE-2012-3959,0,1,daf4a67392a6d8e8b2fcad48ef03f9183961f121cf9210e73c47170d760bf0cf,2024-10-21T13:55:03.510000 +CVE-2012-3960,0,1,42b1bd670820885d367c797bda19dd0394102adf0338494db93adf31a5d3c99e,2024-10-21T13:55:03.510000 +CVE-2012-3961,0,1,40a342007191395036a3bd085e7a89c21ce6711b8e899bc99adc399bb8e3a3f4,2024-10-21T13:55:03.510000 +CVE-2012-3962,0,1,a8253a8f3bac033bebfce4693d3a33e6aac6b7aab872ca38aab00fcfd8e75dbc,2024-10-21T13:55:03.510000 +CVE-2012-3963,0,1,3c22c005113ef2351b24722169d301d457ea9c62e0ec849db66b9c0c07beb914,2024-10-21T13:55:03.510000 +CVE-2012-3964,0,1,cc72adc9c1f741b5c4fdddf30de9626d9608a281196e4218baf05b50fc18d37b,2024-10-21T13:55:03.510000 CVE-2012-3965,0,0,53489d2ad1654bcb66ddd064bbfb5d196e3ee4170bb062591f7dd3b127d96fc7,2017-09-19T01:35:12.653000 -CVE-2012-3966,0,0,124eed54befc0dd5ee739e8cd5b088c91edb2e15fbb800bb2aa1df62b350a627,2017-09-19T01:35:12.760000 -CVE-2012-3967,0,0,f7cd12bf8e6abbc4ba52cd6035c9dfd19f6b0e1c95d42c93dd60c9ec53ad5762,2020-08-14T17:21:26.127000 -CVE-2012-3968,0,0,d3d82964b4660b07407045615d259f61748a7a98d217fe5c5af2ec98580a19e8,2020-08-28T14:23:58.203000 -CVE-2012-3969,0,0,8dd8bab9a719be610e8265f3fa4262b190c8f1f863eaabb6658712e34a92406b,2017-09-19T01:35:13.090000 -CVE-2012-3970,0,0,1b8facca2d16ef958ca4b99e07767e66c6faf08d54b2e3dd470f4a0cc4db02c3,2017-09-19T01:35:13.403000 +CVE-2012-3966,0,1,6062db6c258556fbe41e9c1cddfd0caa92c3993dddf3f8442362abad7f23c154,2024-10-21T13:55:03.510000 +CVE-2012-3967,0,1,ed1ae7e98fba4a64fbc5225c3bd6eedf5f638f9e096d77092a066fe4d59e3e88,2024-10-21T13:55:03.510000 +CVE-2012-3968,0,1,b36381035991aa41450bd151169e9b6ff3416c76272b1833f0308223a7d806e6,2024-10-21T13:55:03.510000 +CVE-2012-3969,0,1,0d0dcd3bf709168824bbf1ba3f3e31fcd253212b1178ed9a1712ada61d707df7,2024-10-21T13:55:03.510000 +CVE-2012-3970,0,1,793b550bef2991fb743abdf8b6acdd28a40cb8d77afc8be769dda0198cc1e388,2024-10-21T13:55:03.510000 CVE-2012-3971,0,0,d9513a242d3ab8651890ddb5e34d89f70ffc1bdfb0759138a046da25db7fd000,2017-09-19T01:35:13.510000 -CVE-2012-3972,0,0,92be64862ad1d42653bbb006761845fad229f0ccf9d995041d1af21e0cc102c7,2020-09-09T14:51:23.557000 +CVE-2012-3972,0,1,f2f8d8fc7fd1898a26433341e2621af3b7de76f498a8fd60080fc0137fb36e72,2024-10-21T13:55:03.510000 CVE-2012-3973,0,0,81461171ae5c4de54454581baf3605bdaf1c5b85c763de9b028fb869637d2c17,2017-09-19T01:35:13.730000 -CVE-2012-3974,0,0,ee76107f5cd86af1528f4189d9e826494e1d403cc4cec5e07af3f7b865809005,2017-09-19T01:35:13.823000 +CVE-2012-3974,0,1,251d3e3aad6679205c5e514aadf0f2950c718a545d3ce44fe404602dba9b04b5,2024-10-21T13:55:03.510000 CVE-2012-3975,0,0,8d7b0293e976e1f2b5530058c41eeb01c97f7aff6cbba6203fc292b670051118,2017-09-19T01:35:13.983000 -CVE-2012-3976,0,0,cbfe04b0aa43a26935e0652e01ed8caa7a1ca5664e08fddee237902093144cf1,2020-08-26T20:39:08.833000 +CVE-2012-3976,0,1,5cb49d292e660129b6da6df182b9f68f922473625d54f3c9fafb999b3a2584b7,2024-10-21T13:55:03.510000 CVE-2012-3977,0,0,920ad0c2f8382b1a4438c3d7a6ecf83f4bbf330a39d56af02985c1e16589a5b9,2023-11-07T02:11:41.997000 -CVE-2012-3978,0,0,2c433572b2c68e74f99d92d8418fede5d99f75e164af8eca8f76458384774112,2017-09-19T01:35:14.230000 -CVE-2012-3979,0,0,93b95f1a685fb947f38c41e7b1757fcb380a0faf5e0fc70ce267c0dc2acb6413,2013-03-26T03:37:58.450000 -CVE-2012-3980,0,0,1115edcc0b0926b2ca5cc58a0e7c02291db93efa82e13bb266b9dbd0ce6efb74,2017-09-19T01:35:14.340000 +CVE-2012-3978,0,1,29baf885fbc53c7132d14c4fba1ea48f937788122d25cd3d5766d200647e0ca9,2024-10-21T13:55:03.510000 +CVE-2012-3979,0,1,14b0feb908acad5ba2b73605ee365188f4b00bdddd3180b52df76c7803f96b63,2024-10-21T13:55:03.510000 +CVE-2012-3980,0,1,4e30ec19b6b3f8fd459f3829cb8db5703bd490f99741920b5a6e5dafde8b5257,2024-10-21T13:55:03.510000 CVE-2012-3981,0,0,c9c82193a0bdcbe06050b508fa642b81cc41fbccce1ae6958db7f96cbad4e97e,2017-08-29T01:32:07.353000 -CVE-2012-3982,0,0,5420dd74a658f51d421bf4b076403368801555836c0a8d5666c9d021b39ce128,2020-08-10T15:53:29.497000 +CVE-2012-3982,0,1,f24ec8fe58ba062b9008f68682a61faa04366561eea107f78ab0412a38c60934,2024-10-21T13:55:03.510000 CVE-2012-3983,0,0,9467f009aa6c75ffa615a1da12418c2d4d16edd97e0e68594cb1f6f7b6383f5c,2020-08-27T14:53:01.623000 CVE-2012-3984,0,0,a6f2bf4eca5d495b42e662f1bf55c205ba86133fd3b9c9e1328c0e0407f46321,2020-08-26T19:36:10.453000 CVE-2012-3985,0,0,db83ab95678128c35d4da14bb5a61f098faea6a651b44ebf65f01f4360648c8d,2020-08-26T19:36:42.500000 -CVE-2012-3986,0,0,b340db3876de9e7afeaa3c6a189831a0c7a9a39aeb1e59fb0a1c17e3113399dd,2020-08-10T14:47:50.280000 +CVE-2012-3986,0,1,cf19b80aca55e1ebb2903459e38eb0b8e78378516dbfa41af0e5e06199209d44,2024-10-21T13:55:03.510000 CVE-2012-3987,0,0,788054b9241800af72e0560298716940fe444e160ed94ff5bc3877e137e20067,2013-05-04T03:20:06.787000 -CVE-2012-3988,0,0,38e85e5d1b8befbc2bde94c85c331db85e98b0fd1c0bd9913a80d7976c2811d9,2020-08-12T18:11:37.117000 +CVE-2012-3988,0,1,d2f512439ee5703e3874d8b7a493652724e09b1031c5984b1b33dc2937f49546,2024-10-21T13:55:03.510000 CVE-2012-3989,0,0,0a0e0faffb90a4a123a2f82141d44088577e5be0d4c09d01d00f023b4c806c1d,2020-08-27T14:50:17.803000 -CVE-2012-3990,0,0,bb09702bf5e938173de1a27f6558650512f51983744949131595b6cc1220f106,2020-08-13T19:27:04.097000 -CVE-2012-3991,0,0,8671f519854d7bc77b4da3830c26d41daea0ff3e1be651a7d3536f41c957623a,2020-08-11T13:37:38.360000 -CVE-2012-3992,0,0,eacbd65c1b46fe4a60ccf02c7ae6b9ce50a1e7b79564f6b3810804bfd14d15c5,2020-08-10T14:52:22.617000 -CVE-2012-3993,0,0,518068ec6c19cfa8b2e301f0b7db511b159b777c6425d4b8dd19c8acf262ea1b,2020-08-13T20:43:34.227000 -CVE-2012-3994,0,0,6b92ad8ed26c0a090f04314e701645632f3ec2f35e4e361a9cc1cbca36af5a6a,2020-08-07T15:42:31.597000 -CVE-2012-3995,0,0,a9588deba99eb4da8fe8ffc24d80344d48d7a757ec59d9927126ed55a6f3375c,2020-08-13T18:12:40.547000 +CVE-2012-3990,0,1,98b88e713c1b55421a314d18765a14b38bd82b46b4b6dc7c5719ec65965be684,2024-10-21T13:55:03.510000 +CVE-2012-3991,0,1,efc0ba48b3b22caf74c92b6b5eb2de00249a0a810e4238a901607afdcd6c48f6,2024-10-21T13:55:03.510000 +CVE-2012-3992,0,1,0e1ec49350fcacebb0ef616d6b8cba4d5227daeb5ed5258c6ff2370b9bd04d20,2024-10-21T13:55:03.510000 +CVE-2012-3993,0,1,f88b3322fdce8c93ef7e3776a3b273978507ca059982f12b0d3828421cb7ac28,2024-10-21T13:55:03.510000 +CVE-2012-3994,0,1,4b16c6b4afcc773948e424c299c284e2e89ca2f773e80ab5856daae4e09a1b34,2024-10-21T13:55:03.510000 +CVE-2012-3995,0,1,8197176238b62701ef47db01d244c83919c956d6e5b4344c99ebdd423651532e,2024-10-21T13:55:03.510000 CVE-2012-3996,0,0,ad007cca1319351d2c9819acc11feb42196d6c04e166372cd5f2bfb3d08f39f0,2012-10-24T04:00:00 CVE-2012-3997,0,0,05b98d89ec7afe524a9b9680ca1f05f4ec1e437d255bc33e75378a6451055f8b,2012-07-19T04:00:00 CVE-2012-3998,0,0,e6824bed22a2188c9b61d6d7a3531538f2bd21964b7c0f19f5f4a25db32b2d12,2012-07-19T04:00:00 @@ -55565,43 +55565,43 @@ CVE-2012-4175,0,0,aa3b78d1dc78ea97a8a4f5b5f004143677491cb44abb89089a52a608f17570 CVE-2012-4176,0,0,be3188c1e96e3e004a76a26a8656b3f265dbc3009176b32218630b895d68fe07,2017-08-29T01:32:10.713000 CVE-2012-4177,0,0,e8992bad5f4170794dfd01ff9c032bfba8ac678d6a2ce6365232ac276c22e5c0,2013-04-02T03:19:51.853000 CVE-2012-4178,0,0,1e2b8d811e158f6cfbaa83782293065e1d7ddc1b5275cad4cf603fd0b4b8247e,2017-08-29T01:32:10.807000 -CVE-2012-4179,0,0,d136855a142f58b5b4fad27e9326cf181af381fc097eb6084c9181329b84e225,2020-08-13T18:21:48.077000 -CVE-2012-4180,0,0,5fb2dda7d37454d6b5eaaca05c55a98085063d0e68ac947673112ab39e8e94a3,2020-08-10T16:44:37.080000 -CVE-2012-4181,0,0,46558494b7500ddde3196185fee28b562941c304461478e0d2ee3d9d3c40a5e6,2020-08-07T15:42:18.127000 -CVE-2012-4182,0,0,b34932c277b54e95345324341c1882a2214c96b740d682840e815c833306bc31,2020-08-13T19:32:16.933000 -CVE-2012-4183,0,0,7bab6fba0867d4b7f1f3abc892cead3b14c3174c49b69b95b3367745d63d609a,2020-08-11T13:47:11.720000 -CVE-2012-4184,0,0,a4941fca29ce8aeebd748fdb605974c5acc5bbc18bd0b9716bf5dc8a49fc3d35,2020-08-13T18:32:37.500000 -CVE-2012-4185,0,0,ba1ceddceb31753f3bc5a832c973cb3fcf399446ade93fae3ff4c91c6f377689,2020-08-10T15:19:27.830000 -CVE-2012-4186,0,0,7eaeb0f0b79056b2fb0332beee31464bf205ae80176abde8cb7e6f0ac019d65e,2020-08-11T13:43:56.960000 -CVE-2012-4187,0,0,b8f165bf1b5f9f9e8870bfaa9a49add49b210afae09a7375b1ef86c4b9f8342e,2020-08-10T14:59:58.730000 -CVE-2012-4188,0,0,5eb710a3acd05355b24bfc5b0d3772dc17ac281709c79c1bf5970ccf2ed5f23f,2020-08-13T19:29:47.350000 +CVE-2012-4179,0,1,6812de3811d2a26de0f90fbede900b3b7f8ed23ae5c3bd7ecfa7f08bd6ccd825,2024-10-21T13:55:03.510000 +CVE-2012-4180,0,1,946bbcd4eee5245944732fdb2adbaaa7e60355da98acc1053b80fe500a13bdf2,2024-10-21T13:55:03.510000 +CVE-2012-4181,0,1,0e6e94f5ba2407f493844a23ea24337879794c3bac57d1e381e7b4822d3cb524,2024-10-21T13:55:03.510000 +CVE-2012-4182,0,1,8cc3ce7ec49d3522cc67c756b590666d738ac76fae9400c0e376044af67b4a65,2024-10-21T13:55:03.510000 +CVE-2012-4183,0,1,1a5e675717707c8c3da4a3507a8a6d3c82c9e03250b5c5e4169d2bf676c31097,2024-10-21T13:55:03.510000 +CVE-2012-4184,0,1,5c69049034bd051fa1907aa94d23c5851c5a33ef5cf2b6790a9f3153695a4766,2024-10-21T13:55:03.510000 +CVE-2012-4185,0,1,56bde78bc47a3f5e58c18c62ca4300b5f8a308bd1a5b602afcf5ea4bda93f3a1,2024-10-21T13:55:03.510000 +CVE-2012-4186,0,1,8e31946fcfcd6b2b1c255e8e6ede1f5e278c872fc2ee1521e22e330c2578203e,2024-10-21T13:55:03.510000 +CVE-2012-4187,0,1,0d00f41a4a5df6a6d5e868057709b4ea29a8c85a8c6e915880e2901574db50a1,2024-10-21T13:55:03.510000 +CVE-2012-4188,0,1,e776e515b6aef8ddd376b083abb3a3fdb47577e6620f3d17bf2d3c88a05331c2,2024-10-21T13:55:03.510000 CVE-2012-4189,0,0,f2865c744bce4332e05f8cc444e32e79826f40e9ed09e5a13be548b2173cd88e,2013-12-13T05:04:40.190000 CVE-2012-4190,0,0,733907bd9ad88436373982d3a0a3b8ad23647ba27471c2148ee2f982707ab614,2017-08-29T01:32:12.167000 CVE-2012-4191,0,0,53d4721304dd7fd09e9b004d36f89b9e2da741a7a483e5fcab97d545b0c11823,2020-08-14T17:27:09.557000 CVE-2012-4192,0,0,6c0ef30d1d804f0a9f517ffbb02b90c81e9b7ccf82a4fa454d6f3a552b146831,2017-09-19T01:35:18.887000 -CVE-2012-4193,0,0,05f6710754fbbc60b26ab4ef3c179c9c49af7bc88b413fe3f030ba297893e643,2020-08-14T18:07:29.993000 -CVE-2012-4194,0,0,2dd0a412dfa66d32d906ff843479764860171deb0f2274a414e448d5f18496f3,2020-08-12T17:43:30.583000 -CVE-2012-4195,0,0,4d0ea905e5671438e78e2ecc8eb8342a2a7aa6687fd1b269c1de6a7884b64fbe,2020-08-12T14:39:20.997000 -CVE-2012-4196,0,0,e2eb8e5ab428a3ee0c7f16d4cbcca2a1ab923e909ba5eb1431d1c3d025f39925,2020-08-12T17:45:13.697000 +CVE-2012-4193,0,1,e180b61461fe5f6de565a870db92399f2d1a6b2bbb537d8eb9d7197525d2f13f,2024-10-21T13:55:03.510000 +CVE-2012-4194,0,1,99bf63a7b5972463c5630c88595585ee90d71d855bfd4f43589f5d08b2afbbe3,2024-10-21T13:55:03.510000 +CVE-2012-4195,0,1,c52a0f9f9523dcf743179b4c20734d86460d6b619333d3834fb1c224b09cd490,2024-10-21T13:55:03.510000 +CVE-2012-4196,0,1,96961bf9e95abe0ef1fb840cf171c6e63c6d489687e32a216f5bf8fdf8d791dd,2024-10-21T13:55:03.510000 CVE-2012-4197,0,0,08dc8ab02edd46189a4ea4c65749244b282e23b051b00baa148c90aa431398b9,2017-08-29T01:32:12.617000 CVE-2012-4198,0,0,cc3d2a2581f0dad861ed10684ac4fbcc5f56477b9a18b914139f16f31c699e78,2013-12-13T05:04:41.690000 CVE-2012-4199,0,0,edfb47ce7f1dc4422796270127d1669132f980c1f68eb0227b365c1370e3c300,2017-08-29T01:32:12.727000 -CVE-2012-4201,0,0,b5a467adc75ab07f1eea9d35e5731a50db18be2736f2f72506b738a0404d5115,2020-08-14T17:33:44.860000 -CVE-2012-4202,0,0,5765c532787707a2b47a1adc4072ba7a9be552f8ec7ab82bb5f4b4a0c319a2bd,2020-08-06T16:49:58.670000 +CVE-2012-4201,0,1,6676b7b6b9ae1468e9277d1cce318683e8ea0467a3b141cf17d00bd58daecde9,2024-10-21T13:55:03.510000 +CVE-2012-4202,0,1,2b49e0177f8bab398c9b6e0296950e2a95afa4552c5c77de9778ff4836812193,2024-10-21T13:55:03.510000 CVE-2012-4203,0,0,c4b67fddab9d881e7556a62052885dcf3028fb5142ff3f4746ad32bfe9ffb7e6,2017-09-19T01:35:19.807000 CVE-2012-4204,0,0,46638392e0038992f4c27d729b0b975299cd910cbf6362f211c05305b51ad758,2020-08-13T13:26:09.667000 CVE-2012-4205,0,0,a601d31984554890cbdd40320332a2311819b563d15814e6aabf3b7f291be868,2020-08-21T18:45:01.517000 -CVE-2012-4206,0,0,c91d19a96f4e88b45993be025591900007fbac55c49ee309f130ef225208d233,2017-09-19T01:35:20.153000 -CVE-2012-4207,0,0,6b82280a2d4e5e164823c71c702660fcf326d759634441451131dd451c53a557,2020-08-13T19:20:45.027000 +CVE-2012-4206,0,1,049af9f1477862ec8947240867e3a727e0288a12eae93042e29c79114e3624a0,2024-10-21T13:55:03.510000 +CVE-2012-4207,0,1,b350d4863d415cd8846aec3e5ec4050cfb8173b710557fe76f9facfe7a393a05,2024-10-21T13:55:03.510000 CVE-2012-4208,0,0,70adbb45edbf07dbbc9a78b5ad50be033069e0df88c3b9e61535e77aff5b4d43,2020-08-12T19:45:01.403000 -CVE-2012-4209,0,0,391f2b1b94f8ded1993229d83cdd54db6eef6f76d8c06df58ba582fab919c1ce,2020-08-13T19:32:31.197000 -CVE-2012-4210,0,0,64af3c4d2b98d02033137a729095050bb04488eca3c5fec46bba1433fdd7744a,2017-09-19T01:35:20.667000 +CVE-2012-4209,0,1,b23cccbb13d06933f69cbc2132667f0a9d8653c8035928f32ac7777e5f366082,2024-10-21T13:55:03.510000 +CVE-2012-4210,0,1,80487733b82c1987daf89c2f5644534661f023383376aa2ba4e9d1a666b05c0a,2024-10-21T13:55:03.510000 CVE-2012-4211,0,0,356592837425022874c8d614f4917ee8bc030f3e232684ddfdc043332f71855f,2023-11-07T02:11:49.157000 CVE-2012-4212,0,0,e87b53675507bc51b864c1f356fa1f506ab48158f14f2813e36c0412aa26d863,2020-08-21T18:44:30.110000 -CVE-2012-4213,0,0,d92dfd21d6f10b42132ab75587da7788049029aa385114be4632abd9efcc34a8,2020-08-12T20:01:21.823000 -CVE-2012-4214,0,0,7b4a1b838091d52c49db77fd8ff9c8150b443bc5cddd650856e1d3ca0265cb48,2020-08-13T19:38:32.473000 -CVE-2012-4215,0,0,07c8e172fbe62358be390adfc15b6787aed6d52a8e749f12e9b6285ff79f956a,2020-08-06T19:21:05.513000 -CVE-2012-4216,0,0,36124199aff0b22bab47bc7c51b54a25071e4eb6bf354b848ba587fdee0b5cf8,2020-08-13T19:42:18.237000 +CVE-2012-4213,0,1,aada789fa0b6587aa1e334f8bd231f6e99de6777307f3dcb5e56fe5af6a274a0,2024-10-21T13:55:03.510000 +CVE-2012-4214,0,1,37efd964b8282d9c6c0f4cdbd48652b7f603ebfea9aaf53bff2a33ef92486248,2024-10-21T13:55:03.510000 +CVE-2012-4215,0,1,70bf1e8bc413b573aff9947aa98c8d4f61eba1dd1fea3f6c9f84a06701b23096,2024-10-21T13:55:03.510000 +CVE-2012-4216,0,1,09369fa06a3362fb731fc6a15a389ffe5b0fb885d48770829599f97a64fb067c,2024-10-21T13:55:03.510000 CVE-2012-4217,0,0,746f8036d83acdafc9a06c3cee712d02bf2bcfaafb100c2bde5e13a6beed22e7,2020-08-13T13:30:23.390000 CVE-2012-4218,0,0,bff5d1c34cf6def61a6160b33fd49ea2a3294b6a58ae228dc952940ea5895262,2020-08-21T18:44:09.217000 CVE-2012-4219,0,0,4299b3993f1cd5b5a4d6bd85f11a646aa8a4e54f82f262b5e1eb9fb1f51bb27f,2012-09-07T04:31:24.803000 @@ -56956,21 +56956,21 @@ CVE-2012-5824,0,0,678fb553295ad30384c721684366902b946bd7836ac7c013aae9df28485124 CVE-2012-5825,0,0,c8538ec9c1eaa622e3d5e628dedddda2d6390d5a07947fbcc881d5f88b4f019f,2017-08-29T01:32:47.290000 CVE-2012-5827,0,0,093b15388fed5d4d8d728ba64a739b92668d4169a2d3c8b58c3cc5f833f33595,2017-08-29T01:32:47.370000 CVE-2012-5828,0,0,b047ea24854707421d2b46e32f72854643dc515ed6a1600aa6841566c55db6bb,2020-02-14T17:09:40.083000 -CVE-2012-5829,0,0,a5b66aa9a234d89ce3f918d12938d6705e5aa72f3db7b6806dca4414cb356fcf,2020-08-14T17:38:34.083000 -CVE-2012-5830,0,0,f3760a213335e35320ec2e37be770877d935fee34e408893d5ba0a1f09160a2b,2020-08-13T17:31:30.397000 +CVE-2012-5829,0,1,3f96438988d985fdcd492719d721cbed31f6d30dc48e5cb71a3fdff64205a886,2024-10-21T13:55:03.510000 +CVE-2012-5830,0,1,a8c6d00a1a8955140009968ddb8e8bfb1735af5d32ad1726721e016ace861967,2024-10-21T13:55:03.510000 CVE-2012-5831,0,0,e8799c64cd9a7c817fb7970606e58cf5c17d99e9e08880ea25bd972fb730da32,2023-11-07T02:12:42.050000 CVE-2012-5832,0,0,8c52ea9bb18086988d47107b6ec87f0bc0ede6de36258a72c2c15dfe313583be,2023-11-07T02:12:42.357000 -CVE-2012-5833,0,0,3f41721abb0a89ac59e2bf4963e0cfd8a5aa188f8a4307da690b3cb1e7cefc6e,2020-08-06T16:50:06.827000 +CVE-2012-5833,0,1,8529cb6b9ec8a43f46747dec97e5c424bb5ffdaea20b672b97912479061224c7,2024-10-21T13:55:03.510000 CVE-2012-5834,0,0,ffcdcdc166957e5645ef105d300b9c6678174f8ecb81369640a72bfa0cd254cc,2023-11-07T02:12:42.600000 -CVE-2012-5835,0,0,170ba8079a37b7684a9ce39d11a024413ad5b083208e5a76dee2065c1d4bd90d,2020-08-06T16:47:38.523000 +CVE-2012-5835,0,1,6deba7aeade67a8032c161e9aee68ec25ee4cd4678754aed4ac8deadff0c37f2,2024-10-21T13:55:03.510000 CVE-2012-5836,0,0,c3b861cb395d6618d8fe94608ebdce882b6fa2fcc49a872fc0562bf3a5403448,2020-08-13T13:44:39.193000 CVE-2012-5837,0,0,05fdfc0e804f0cd455cb806a374cf943313a85c60dc1f95340e851782e36df16,2017-09-19T01:35:31.043000 -CVE-2012-5838,0,0,7e76d85d922d29e14306541041f6047ecb8735a35e9039d3d0d0b2ffcaaf2087,2020-08-13T14:13:28.127000 -CVE-2012-5839,0,0,e4a3f52ee6eda7d402a29c71671c12ddbb07ae8e48e03563bf8a67b8e0fe6d94,2020-08-06T16:47:59.073000 -CVE-2012-5840,0,0,ac29d2d4b076126162f7859df18b5a16e4aa53b082a8b9cf96db1344195711e8,2020-08-06T17:38:34.317000 -CVE-2012-5841,0,0,661fe80e9b466637a2d616d9f267c1b4036e252090e08b815fd4807cc4b2e515,2020-08-06T16:48:46.497000 -CVE-2012-5842,0,0,70074740e7dc2b4a43ab70b5d72548a506728561b067967c3f10699fd02a861e,2020-08-06T16:47:53.727000 -CVE-2012-5843,0,0,a28d4c20420819d9dd0fbb54c30c620df81a91afb6cace7f703763c515660bc5,2020-08-13T14:46:42.943000 +CVE-2012-5838,0,1,03099847c9e0f73da0783aa6441e16d12eebd37eab1c3dbd23296e48f5223d88,2024-10-21T13:55:03.510000 +CVE-2012-5839,0,1,03b5744bc5e3d6bee7eeaeadf2c20d32e258f3863f53e02ffdcb217e92abc445,2024-10-21T13:55:03.510000 +CVE-2012-5840,0,1,96b4fa360a05e4e82c07e9b9b3b0957d4e94461af851b9ba5ee46d4b3be2a459,2024-10-21T13:55:03.510000 +CVE-2012-5841,0,1,c52a857a10dc9c4d3fe7389a13c58504647b9cee8e61e05126536ced426760f4,2024-10-21T13:55:03.510000 +CVE-2012-5842,0,1,9a978090c5109d93f051f6eb8062856ca86158cffdd371388716f348f95a763b,2024-10-21T13:55:03.510000 +CVE-2012-5843,0,1,c3a0e164c09c0264773f2ae83432127de30394c54c8944ab41eb83df1c67bd95,2024-10-21T13:55:03.510000 CVE-2012-5844,0,0,b3fc53b3f5f736434d5c0a940e1033f4a77340d1ad79c6c33ce6a0489baf9710,2023-11-07T02:12:42.997000 CVE-2012-5845,0,0,52421a8cc1a7e56cc730af98ac5868b134c496461a51eab1ded53b26f0d6bd35,2023-11-07T02:12:43.220000 CVE-2012-5846,0,0,293c765d9bbec76316e616d29cb7fcf84895e8987d32cc4458fd70dc76a65c59,2023-11-07T02:12:43.430000 @@ -58400,64 +58400,64 @@ CVE-2013-0740,0,0,d980e2e5dbd6969a0c532142e79d9891562ea83287be025801f94e226bb12d CVE-2013-0741,0,0,9b85e920d7aa0edc1d0e10ca39554d376e5b66448dff8e5c6f264ab2d4b1e0eb,2013-11-19T19:06:11.520000 CVE-2013-0742,0,0,b0c787caefa2e627e5f0bf2ccc6b88f51862e85bb9ae6a1d2b9c51ddb890ec87,2013-10-07T13:35:52.220000 CVE-2013-0743,0,0,5a0005a7227d006d5a7afc9eed6cff69a8c12e6063f8bd6095a660881cd0b12c,2023-11-07T02:13:55.203000 -CVE-2013-0744,0,0,cd3d52f501d2f04fbe82340972546d598cde1bd6f77c8eea5eee090d082f94b3,2020-08-04T17:35:16.523000 -CVE-2013-0745,0,0,b3942d8a3cb78189f8abd5a8c42f6caf63933c972d0df0f467dcf35cdda28cae,2020-08-10T20:31:15.117000 -CVE-2013-0746,0,0,b401d2557f53ead84f2f72f36acb1551db174a38bcc890654db1d5b56058e137,2020-08-04T18:22:51.397000 -CVE-2013-0747,0,0,6affeb355758e9a3520f3c008614311552e2589ccf4dba40751c8978ac10b489,2020-08-10T20:58:23.057000 -CVE-2013-0748,0,0,dd203ea855712d046f7f7855db03a185e697cacf2156406a94b9d5d6964f5949,2020-08-04T18:59:10.697000 -CVE-2013-0749,0,0,a640ad016bac9494305abae50932d5845364bb0baefd7ced879265f24d9635d5,2020-08-07T17:49:54.093000 -CVE-2013-0750,0,0,1d5ad422d9cc1838efd4ad038156b157de0cb60e7f0a484314bc5e346d5e8630,2020-08-04T18:59:54.540000 +CVE-2013-0744,0,1,14aff7c77b461e89df33d599f049aa9366df523c62611112094a777046b709f0,2024-10-21T13:55:03.510000 +CVE-2013-0745,0,1,30c439fa896e1541cd00cc05087cc87f6ff60132eb393635f7a9b2a72dcc8c2f,2024-10-21T13:55:03.510000 +CVE-2013-0746,0,1,60a4b7cac50fbd897f5437d6510c3bf4344a87b1d706f0a8d1569744d0f5a747,2024-10-21T13:55:03.510000 +CVE-2013-0747,0,1,afe5b2008f114e107e9de73e83722ddbca17992d5a0752bd3b8a1f99d9ff082f,2024-10-21T13:55:03.510000 +CVE-2013-0748,0,1,2de2f330e1c573bb627c32868683d6ee4be60be467324dd50c05e305cea84ab2,2024-10-21T13:55:03.510000 +CVE-2013-0749,0,1,ca4669353c22ee908e8cac58ec61d358bbc9e0db13afaf9a167be2bb9b2aea3d,2024-10-21T13:55:03.510000 +CVE-2013-0750,0,1,4c56f336c40d21f7d497be2142a651054af7e8fdd84942b1ae6fe267788ec5e8,2024-10-21T13:55:03.510000 CVE-2013-0751,0,0,90979565f2f3d7895b5e292a74d612c19eb8145beb3428622a4bead4347b5234,2017-09-19T01:35:45.777000 -CVE-2013-0752,0,0,6e93bf5150f2c47b69ca16f5ca53bea1997007a6ba7c8ab8c496b7845cda28e9,2020-08-10T20:52:39.753000 -CVE-2013-0753,0,0,4240c406a579e0e615ea323ef6bbe643ae9635b1d025ccd859a264ba7c3c2081,2020-08-04T16:21:37.827000 -CVE-2013-0754,0,0,20edfd99395045f3676e30184684a90e651a21f867ea513b4d0a002cdd082ad4,2020-08-04T15:35:05.860000 -CVE-2013-0755,0,0,083e6272c5bfd2e66b93d6eb1fe51d131958a4180913d3c5f80163bc7883d52f,2020-08-10T21:05:59.677000 -CVE-2013-0756,0,0,ffe1f41f4b05ff9555792a7ce6ae54a6dcfff1d59c86d6c9512401711a744ade,2020-08-10T21:08:16.433000 -CVE-2013-0757,0,0,ab6c6ff202d2fb4c173d6d10cab24b67caaf3066caa91bf4baaee413b340ce73,2020-08-11T13:08:36.350000 -CVE-2013-0758,0,0,587b30c4b7e9b1df485865e7d47b2aa675bbd5a3c1df72c5abb187ea293f0c4a,2020-08-04T15:32:30.123000 -CVE-2013-0759,0,0,de047e282ae8ac56aec4b9c5cc559e7eeeea8e01f9fa173241dddff59fb37c0b,2020-08-04T15:31:56.480000 -CVE-2013-0760,0,0,75085e9d81d9a84baf8ada7d6da2c1609ab459dc3f0e0fbeda0ff42035e9083d,2020-08-11T20:19:40.740000 -CVE-2013-0761,0,0,e35ebde4891b5fc0dec2b216b27f0a3e7492c9c4ea10896187cd94cc63d7729f,2020-08-07T17:52:54.650000 -CVE-2013-0762,0,0,f1de9db3e3debb7728179da105b91b6e06d1281d2d36d234b20d47bde9e2fea1,2020-08-04T15:31:25.090000 -CVE-2013-0763,0,0,b89409b62010ad0261d7f47f843d7f2da1e2075398bf6b424913d0279340c6ab,2020-08-04T15:29:59.197000 -CVE-2013-0764,0,0,a2b354675ec86beaa8e1b2f168d4ec2e788495bfc79d1ea49f747bd923e2ff35,2020-08-07T17:54:20.807000 +CVE-2013-0752,0,1,ff31d2f89cab5049e667285ec753eb5392153858eeee3223998b210a8642bc9a,2024-10-21T13:55:03.510000 +CVE-2013-0753,0,1,d1a98bcff668e4e758b3d1c149adfdf4bb5d022da224a13e0b9312f672c1d456,2024-10-21T13:55:03.510000 +CVE-2013-0754,0,1,60b0e89b00e0b3457d079e5e287a4b79c33dd14237ecf94b209b89193939130a,2024-10-21T13:55:03.510000 +CVE-2013-0755,0,1,9f6ad7ef87f9a1985b34d113eff60a5fc6e18cb22d6e0aa2e17ed90ddfb53b64,2024-10-21T13:55:03.510000 +CVE-2013-0756,0,1,69c26f2a4d8caa0c0cd4353510eb7c1aedf3731bdb8ab37c36f6b2cb5031722b,2024-10-21T13:55:03.510000 +CVE-2013-0757,0,1,c5be3a8982d8c472f62e0c798589d5f7db8ffb742df1e139a81b7ed367529363,2024-10-21T13:55:03.510000 +CVE-2013-0758,0,1,d33b071cea161889053ebb3cd407a20ad9bb7ebbbdc649b72f42c236acc6e00e,2024-10-21T13:55:03.510000 +CVE-2013-0759,0,1,f794287e851413cabb97a6d3089424b5874dc067a93d230af4978c573a3a5827,2024-10-21T13:55:03.510000 +CVE-2013-0760,0,1,43e4578498565550ca5e9e9060541be506c1e00db2e75c69bf6f932ef74e69f8,2024-10-21T13:55:03.510000 +CVE-2013-0761,0,1,6290a3bf950cbd2281f2a98b96ca4fbe5a0ae0bf2b5315fefa627c978fa2665b,2024-10-21T13:55:03.510000 +CVE-2013-0762,0,1,ea160562f1c625920e4aa6fe951da6e8800dbb57934e5531c190eb9c8658013a,2024-10-21T13:55:03.510000 +CVE-2013-0763,0,1,b4bddacda42b89b0233f330e3927cb8996f69183ff38995cb30c5fa87ae4f644,2024-10-21T13:55:03.510000 +CVE-2013-0764,0,1,b753e8686411b63ebc18e2a86f4422d3b19c3207709aac75d3e0cd58286ca7a9,2024-10-21T13:55:03.510000 CVE-2013-0765,0,0,2225f3c706baf3dce338c3b13b4d3ccc9302cb150885e26270436ab2e066316a,2020-08-06T16:02:10.663000 -CVE-2013-0766,0,0,f0e1d8c7a98cdd3c7f0e162b5c05855f97c4b1aa1fd7d7dda5b18e180f5b7736,2020-08-07T18:34:04.147000 -CVE-2013-0767,0,0,0d0cae6380e694db8c7a969fd98bb0dbcd45b746f163f107784f492d9ea8241f,2020-08-07T18:46:19.950000 -CVE-2013-0768,0,0,d5e72b418f78f3a0dd7e1df84df3c846515a7d8133e58e70ddc4102366ffc0e6,2020-08-07T18:48:47.867000 -CVE-2013-0769,0,0,024021d6c9460a454dd06a362244310b1dcd471a9bd4ad4406ca87a80a38e861,2020-08-11T13:09:53.190000 -CVE-2013-0770,0,0,17f2acd244786b2ed7b43d9f4348f2c24b4b60c5b39904ee69525e2f86e7bcdf,2020-08-12T12:53:30.017000 -CVE-2013-0771,0,0,eae07559e84f7468fa569b50c2e33d7ea85b2c22c80b9d27c401bcab317ee501,2020-08-11T13:14:07.470000 +CVE-2013-0766,0,1,f63ce7f8d791411e4ebeaf783e880cf890493f46410ef6d8d0047e796e3a0d4c,2024-10-21T13:55:03.510000 +CVE-2013-0767,0,1,ddc2c4d7f37039a618f5bd827b889be0d06cf82e6597ef9d6b05142a60657d0e,2024-10-21T13:55:03.510000 +CVE-2013-0768,0,1,fb880b3a1beebd4e659fcdd02b911246bf4517c78d4a42a535d9675e396f8c83,2024-10-21T13:55:03.510000 +CVE-2013-0769,0,1,7d4071ef11d61b078bbe141348b55efda35480983819c888817979bda724350a,2024-10-21T13:55:03.510000 +CVE-2013-0770,0,1,afeee49950adfee46467e00036a7cab3c214fd49e7e9a8e591495daa83bd18fc,2024-10-21T13:55:03.510000 +CVE-2013-0771,0,1,9ce5258bd34860f4fc9ecad20ebec6b120124e1af89fb7a3cecd5f64ab7de6d9,2024-10-21T13:55:03.510000 CVE-2013-0772,0,0,b67ed8f3a22aa9794c69563c80bb76a8e608a776dac6424d151ca75e9bb6c75e,2020-08-06T16:28:29.177000 -CVE-2013-0773,0,0,75a4f05c28056db2995f01b611f8e8007131c900e3140043bff98598b426ab2c,2020-08-06T16:34:18.907000 -CVE-2013-0774,0,0,f92e9d93a0f4b8a953af615d05157be57a074d309bc78d746e574d7e10eb2f47,2020-08-06T16:40:01.707000 -CVE-2013-0775,0,0,dc61a98f2fb841c126bcefe126d8a97b74ffa021f1436383cdaf39eeb8f0624e,2020-08-06T16:41:57.163000 -CVE-2013-0776,0,0,5e3a5ebe9335c617419728d3b81f54cc927ee9248d99f87921a1bf0215a1d1f3,2020-08-06T16:47:24.600000 -CVE-2013-0777,0,0,daf4531a8aee0ce9fce990aafa4667efd8c512f849dc6ba6088cabe614cff555,2020-08-06T16:48:08.180000 -CVE-2013-0778,0,0,1b4960011f9d222148a348b2c66adb1c5579c9401ed740821b27d420c2ac43a9,2020-08-06T16:58:03.217000 -CVE-2013-0779,0,0,582541a2431c2c34cf794344450f24e3a66fe92d7badfccff45478bde2ab7890,2020-08-06T17:06:53.653000 -CVE-2013-0780,0,0,2f152b3cd850bc2f6daf78dd42b7d25d1ac90222d94939c4973d5d9ff7585ff2,2020-08-06T17:10:56.663000 -CVE-2013-0781,0,0,1b9d3671f8151d23e4e4a27892cf33ab6677b1d632c8ae27a7b57acffb0113a7,2020-08-06T17:11:41.867000 -CVE-2013-0782,0,0,5e12b6d25ac025e7ec879b5ce08194ea59e25b09e07d9007e43af9b5e166d212,2020-08-06T17:14:28.190000 -CVE-2013-0783,0,0,4bbf4d89fbd27c6f1631f27c02fc8182f40766b85c1e2237c61c0f48e01c2f26,2020-08-06T17:24:47.450000 -CVE-2013-0784,0,0,825ea7ff03f2994452369edde8409658e1ed919fbc91dc6790b3b42ec0109941,2020-08-06T17:29:08.507000 +CVE-2013-0773,0,1,52e387e8009619701b738c3be17a18012b18d1cb13ef23666c652989a4020745,2024-10-21T13:55:03.510000 +CVE-2013-0774,0,1,5f3821475556670f2a39da12af560391fc9b50aa4871017f5028a9a47a723a87,2024-10-21T13:55:03.510000 +CVE-2013-0775,0,1,295963cf1f400e0924a084eaf32f2db3ed275b52b734a29281328b0ff178f510,2024-10-21T13:55:03.510000 +CVE-2013-0776,0,1,c51c645a12098b58f51dfc2612736433df7f3ee6ca47c6adf656fe0de90b8f13,2024-10-21T13:55:03.510000 +CVE-2013-0777,0,1,ab83cbb7b0ff619e66d71756d93ed0ffed2692aad4905205b274e6be44fe381f,2024-10-21T13:55:03.510000 +CVE-2013-0778,0,1,9c56b9bb808d3ca91667841929ca1fc1fd03f5f2420efa3ce8f775dc0eea1d90,2024-10-21T13:55:03.510000 +CVE-2013-0779,0,1,5f239b5d845cd96b8736524ae889c4950b4dbb15273a06a16c7b4c13fe5b90b6,2024-10-21T13:55:03.510000 +CVE-2013-0780,0,1,3373a25fbc273b3229bc88c1766104ff185d6652ec2d32e0b48c9665bf3d573a,2024-10-21T13:55:03.510000 +CVE-2013-0781,0,1,b49d43f731fe7114cb5d14a8e0b3b128f8df4fe06f3003e5fc88e7f8f4b0908d,2024-10-21T13:55:03.510000 +CVE-2013-0782,0,1,0f3c79f4af0e9695763506276b20ec7788ea7a9c8f122a712dd08cee54eb3a9c,2024-10-21T13:55:03.510000 +CVE-2013-0783,0,1,0df61953d5357a6d322ff5bf46bc81f613526aa1537f0ad9506b91b0642dc44d,2024-10-21T13:55:03.510000 +CVE-2013-0784,0,1,8ad6068563220869315bcab6c4025c8e3a96696836c8a360b81efc22db48a30e,2024-10-21T13:55:03.510000 CVE-2013-0785,0,0,eeed7ce9cf5cb52caf8b5913535d1878b580d272544c899b2379e052c034757d,2013-12-13T05:11:31.887000 CVE-2013-0786,0,0,7d79cbdbc1be22654e9fbb721c68ca4907469d95261de2e7264ffd4ef4fafa11,2013-12-13T05:11:34.573000 -CVE-2013-0787,0,0,e2527a02478bb231db33a0fbfcd2553477374b94981516efe74bb095be4a6a42,2017-09-19T01:35:50.497000 -CVE-2013-0788,0,0,a92174e4b7d584369637049e01ffa4397f5f3718a23069681d15e5342f64a2a5,2017-09-19T01:35:50.577000 +CVE-2013-0787,0,1,530d98a4a3670d0697fadff8256fa5ca482eaf23bf271111eccf5b16d725c2f3,2024-10-21T13:55:03.510000 +CVE-2013-0788,0,1,da02167637f659cae117fb276dc58f08088309506393400a7c42880577b77c3b,2024-10-21T13:55:03.510000 CVE-2013-0789,0,0,e272bacaae70072df6b189eb154a8b3d3c47957d03b9f4a62ba9c0cfadaccdb6,2017-09-19T01:35:50.670000 CVE-2013-0790,0,0,d85c5ded3a814fc6bd892d7ea642438b7f26cb93bf4e1e84193cff7fe226edf1,2013-06-05T03:41:23.420000 -CVE-2013-0791,0,0,79ee0aba1e88999ba9434fedb7361c491631ba881e0c2c77c4191d96892a44c2,2022-12-21T16:17:37.553000 +CVE-2013-0791,0,1,01af79176815a36319c33f649e58d3d52c9420184e539df2e80e2cfc304a3fb7,2024-10-21T13:55:03.510000 CVE-2013-0792,0,0,36b9c40f4b99c94a1e70a662ff69853e62a43a05118a7d31198b628aef65ea46,2017-09-19T01:35:50.840000 -CVE-2013-0793,0,0,efdaec4a244837ba02fe9bacddc62222877eb8d0f8053229d081aa67c2db355c,2017-09-19T01:35:50.933000 +CVE-2013-0793,0,1,a61e96b9e84e7fc48f533dc4a7d251cc06850f012d6351a088c0f5e49ceb0771,2024-10-21T13:55:03.510000 CVE-2013-0794,0,0,c2ad1bc9d2841127bb61ecd8b397893abadd3911521c8d6ceaa6333464fd5aeb,2017-09-19T01:35:51.013000 -CVE-2013-0795,0,0,04eb185fd8bfc4fed8d631f04f93b5fb3aa108c4e36b7bb546fa7eec58c4ab44,2017-09-19T01:35:51.107000 -CVE-2013-0796,0,0,328f06de958002cc8d91f9004430e8c3015118a90aa7e7a539625e05c11125e0,2023-01-19T02:41:50.103000 -CVE-2013-0797,0,0,80c4e9c969013fd4b7fbd82d25a2fe88621274d34fe668e195c74463565c9a75,2017-09-19T01:35:51.187000 +CVE-2013-0795,0,1,2e92dadb848bfd8e070a1808bf5100f5c0d0717950217e9199efeac84dade3f1,2024-10-21T13:55:03.510000 +CVE-2013-0796,0,1,f2859f1053767ef64355ad93838f078cdf7c3e098edaa5604ad235e8545ec8a7,2024-10-21T13:55:03.510000 +CVE-2013-0797,0,1,0659146c79d7809d4297126e26e5b91a40e7be273a1bc5b9e02edbe5570f3a9c,2024-10-21T13:55:03.510000 CVE-2013-0798,0,0,efbe8e76dafd7b58cb290e4d6e484e25bda1968da965449f447b6d43145e2ec1,2013-06-05T03:41:24.207000 -CVE-2013-0799,0,0,858426e8194acaa601b66e8230a062c6eff1bba3748dac25b98fcc75a9d8fc35,2017-09-19T01:35:51.263000 -CVE-2013-0800,0,0,c05732f2ebcf3aab82439fa984791293e00e99ab3a25f0f05aa017b909991738,2021-03-11T15:35:13.273000 -CVE-2013-0801,0,0,2848f74d65f3b1e38c9801b4064fff12b37826156764635f5de99dee84181676,2017-09-19T01:35:51.467000 +CVE-2013-0799,0,1,1d6ba9461caea4ae324f9b9fa00ae2b2542df698022e928cacb93bdefbfd96f0,2024-10-21T13:55:03.510000 +CVE-2013-0800,0,1,782a2efd66ff64c5e6c6806f6a5dd368800da7a16ba2c099b4e2c1a7777b2af2,2024-10-21T13:55:03.510000 +CVE-2013-0801,0,1,81df58109cceaa8146d52c11355bf847cdfea6517bbad421d563a805f59ce1e2,2024-10-21T13:55:03.510000 CVE-2013-0802,0,0,af1b747b56dc180460c41dbaa56dda589e614c586fcb301474f5a16a1a2d6c13,2023-11-07T02:13:56.057000 CVE-2013-0803,0,0,920a7a355cec48bb5f766ab953d319deff69ccb66b4dee1aaa8dfcc20f82e1a0,2020-02-14T14:26:01.907000 CVE-2013-0804,0,0,4a5313c7240ab46b9718142b65f0f31c84f71895af34746e1dc1655df73eb34a,2013-02-25T05:00:00 @@ -59291,72 +59291,72 @@ CVE-2013-1666,0,0,744effe5d06f6ae6dd3a2fe677e7d2f585618661c142f74e75ab3beb69445a CVE-2013-1667,0,0,0ca170c7809b8c62a10bb4894341029aa7829cf79171f5c62f678b8b68da878d,2017-09-19T01:36:09.403000 CVE-2013-1668,0,0,6ed427745da541c3a6cf8a2c0f06bcd083f3e4c3c3f28409f1622f99bcd7bbb2,2014-06-27T16:35:59.223000 CVE-2013-1669,0,0,ee6a8959a528005fd556feb17b5e6e13af4a8b45e1ec45162adc1332da48ea30,2017-09-19T01:36:09.483000 -CVE-2013-1670,0,0,19d36e05cefa84ebd534ddebff0b2bdde602d1bfc23d009cc25f936ba49057f7,2017-09-19T01:36:09.560000 +CVE-2013-1670,0,1,d8dd7d8789279095c7ab8a295ff7c08fe7e60ba9c52f6c1bcedb888ffd08d974,2024-10-21T13:55:03.510000 CVE-2013-1671,0,0,a5442a91bcea9089db513dd3dc876ba4c7d1af0a0f8e28fa8f0c664329ba78cd,2017-09-19T01:36:09.623000 -CVE-2013-1672,0,0,e4861a0c8f69eae876b666b31b24fd20b575633f5a856f13d224f2f459b5c083,2017-09-19T01:36:09.700000 +CVE-2013-1672,0,1,b139bffee7d56c77b417582addf96519a5c867c9d7cfda5ca4565c8151d8e442,2024-10-21T13:55:03.510000 CVE-2013-1673,0,0,33a7b69ba9ee5cd98f895876436faa38e4ff896f46908f5bf117cdba25206c1c,2017-09-19T01:36:09.747000 -CVE-2013-1674,0,0,c04b6487c6c80d2e230b2acfec636fd0d834969dff0bd32a9ad79e0776e33fe4,2017-09-19T01:36:09.827000 -CVE-2013-1675,0,0,77faeba28ab48ff8f2157023870278926df4f281b6ee64dc00434ae93a0898b3,2024-07-16T17:35:45.563000 -CVE-2013-1676,0,0,e35fd2017d116e1957c9d8dc2e9e1feba7c2fbabc29c80e679b5e42a9f2a76f7,2017-09-19T01:36:09.983000 -CVE-2013-1677,0,0,356510f2acb5e2fa742ae94f39ae41d3d8ba915835acb27fd4a3eabf562f3edc,2017-09-19T01:36:10.060000 -CVE-2013-1678,0,0,e6be1a294cbebecee41d222ddc5ad57904153471f506b70e42365f3945471fb4,2017-09-19T01:36:10.137000 -CVE-2013-1679,0,0,e3f4701b0b99a1ddf4c7d19eadd6022e0101c4894f406e02ee9ce86c7e066394,2017-09-19T01:36:10.200000 -CVE-2013-1680,0,0,25dc16b12c7a8e60c98ba90100422f54b2e0734a2f5b6043072103422f6e6f70,2017-09-19T01:36:10.280000 -CVE-2013-1681,0,0,5fd563b505bd761430403cd67e0be7da60d111be630fb9de38d8b178f862a012,2017-09-19T01:36:10.373000 -CVE-2013-1682,0,0,b2ad7647147d94718d1dd9773868b0035916da527f70d815cf2f69253d69185b,2017-09-19T01:36:10.450000 +CVE-2013-1674,0,1,74cd714f8ae5771fd3a9218c62482e22fe4325d2008ce0317899b719353f136f,2024-10-21T13:55:03.510000 +CVE-2013-1675,0,1,02c29ce9a5ff8b7909db5f72ffe28e2acec70b6b3695173ee7868c742ee11b1f,2024-10-21T13:55:03.510000 +CVE-2013-1676,0,1,1ca5872af459024ef4c7a5de0ed5fc4dc0a527b01b3ff54af99b96cf58306a1a,2024-10-21T13:55:03.510000 +CVE-2013-1677,0,1,8d8f42f2670c94ce83ac2206249ddc53a94d49ccad1c45e273667cd12ac5c8f5,2024-10-21T13:55:03.510000 +CVE-2013-1678,0,1,060ad18e424e8e572bfc29e4ec53afc8b1f4425a2aba86e148fe5c93f5fbf435,2024-10-21T13:55:03.510000 +CVE-2013-1679,0,1,ef7fecdc945112920daa3b66c73be772212bb76c4e6cc2cddea24e4ce457c013,2024-10-21T13:55:03.510000 +CVE-2013-1680,0,1,1f13f9442de858966c55096037b9248681f46ae66c03a5f41701d3d1a9418e74,2024-10-21T13:55:03.510000 +CVE-2013-1681,0,1,547f053eb5d861a22eaae609ef2d4d005001998f94e9ad17afb4d64ba4b1747a,2024-10-21T13:55:03.510000 +CVE-2013-1682,0,1,4a593f05c0160f6672788e46c2da3b3c0247a0e54d141e70688e465d0ffee219,2024-10-21T13:55:03.510000 CVE-2013-1683,0,0,50be917c1edf30b5899300c0048f52b1c89da344bff3729abc47d096bf6ccdce,2017-09-19T01:36:10.513000 -CVE-2013-1684,0,0,b4fdc6bc3d9a04591377e2fa382c1ec43979c316c395e287e0a16e8edc6b22cb,2017-09-19T01:36:10.590000 -CVE-2013-1685,0,0,22450758abf7e5b73eef38827eb3bb2401188ee6cf2f49fbafe51ab469a2cf97,2017-09-19T01:36:10.670000 -CVE-2013-1686,0,0,dbc18c0d015417ab364bd44efa63a471a62f76a3a89e949df45de1b0f5d4816a,2017-09-19T01:36:10.733000 -CVE-2013-1687,0,0,846b124ff1f45795e1ba880ba88918a71c5cf98c85ffb50cc4a778f86f5f1ccc,2017-09-19T01:36:10.810000 +CVE-2013-1684,0,1,89d1cc3b00121968ea5120b36251fb91cb87420d71a357ca7bbc64c64d806c2d,2024-10-21T13:55:03.510000 +CVE-2013-1685,0,1,d44f460d2f5ab2190dc72011b1b169777b6f7934c781bfc5c94080788181b173,2024-10-21T13:55:03.510000 +CVE-2013-1686,0,1,96dffd78e0f841c352eebeb27ebe5dc9cbcd5d58a8e78d070fefdc9bff85b021,2024-10-21T13:55:03.510000 +CVE-2013-1687,0,1,0200ae384ad04e90bd43bedfe7aa63fac8590e89aff58e7a4b64cefbf9262b24,2024-10-21T13:55:03.510000 CVE-2013-1688,0,0,405891e3a87c9112584a947cdacd3fda2f9f4b1f2c29072e78f46fb50d6722f9,2017-09-19T01:36:10.873000 CVE-2013-1689,0,0,0633b1bef6eaf000afcf35eee4900ec0dc527827a1f8b8cc1ebc9ab5b33d7bf9,2019-12-13T00:22:51.177000 -CVE-2013-1690,0,0,c35c2e4520974353971af1cd1c15137a27864e2885577b76db7aad653a91a3f8,2024-07-09T18:25:57.940000 -CVE-2013-1692,0,0,a65c013b4d95173f1fdca8b4e71360de187ce34672f1f37bedb23d49423f809e,2017-09-19T01:36:11.030000 -CVE-2013-1693,0,0,f864cacf24b9a122963c70c05d21667396130b978091da3b8261cafb738b0e78,2017-09-19T01:36:11.123000 -CVE-2013-1694,0,0,d50b99242cbefb97be0ada6ba3fff4cc9056fe558c94d5e78993ffb83e07e7cd,2017-09-19T01:36:11.200000 +CVE-2013-1690,0,1,6e76df754a620835bf603af8750ed8f879c1ac9c7b3b6e2d21fba1f0903c25b2,2024-10-21T13:55:03.510000 +CVE-2013-1692,0,1,017d1c264a7bd3fe9b1b33e2b962d29306cf6f8d12121d45940a64c231891165,2024-10-21T13:55:03.510000 +CVE-2013-1693,0,1,12fb3b24a5f625a09037e78dcb19e7689d050333e545e5d52e171e8d88034c80,2024-10-21T13:55:03.510000 +CVE-2013-1694,0,1,273be7622c568bfd41601eccb797617f2cc3c70eba1555071b2a976610bf5986,2024-10-21T13:55:03.510000 CVE-2013-1695,0,0,05398cbad3688f36878605495541ba99099bd7b576cbe3656d2a5bb62920e010,2017-09-19T01:36:11.263000 CVE-2013-1696,0,0,959be09e17acb0c7d4b2b7fa7aaa75a53120c77ab46f3e2dbcc0b0f5041aa935,2017-09-19T01:36:11.327000 -CVE-2013-1697,0,0,467e308f1a22b1291c85c6c824ec6bda1090b6a7c36997eb5235f646c7d7913d,2017-09-19T01:36:11.403000 +CVE-2013-1697,0,1,b3dfe0c6d80a1987b540e258b9b921fd12f2bc2b4ce8eae0b3a0ad00a7f37084,2024-10-21T13:55:03.510000 CVE-2013-1698,0,0,a3d55a3e9636df04d953dd8afce2c453aed71699aed7a0d4c0c452b16300a7ec,2017-09-19T01:36:11.450000 CVE-2013-1699,0,0,51e72696b77799fed9876987b5ccdc99aff79e586e8acdfe09b650cffa687d25,2017-09-19T01:36:11.513000 CVE-2013-1700,0,0,417cc2403fe29b10ae28c987e1e0614c561259fefd5b5a136d74aa612d5876c2,2017-09-19T01:36:11.577000 -CVE-2013-1701,0,0,7ba22348a5f6a3c294531d8390640fced4071f85239f9e531aeeeaeda14b7da0,2017-09-19T01:36:11.653000 +CVE-2013-1701,0,1,83c183dda7a4d1fea4d785a850bd5359e0ed65d40ce5f09eb39576d68a3575ec,2024-10-21T13:55:03.510000 CVE-2013-1702,0,0,f216079bfc6a4ccd2386807f64094c67ed2c764af291fa340a5b8a83db03267c,2017-09-19T01:36:11.747000 CVE-2013-1703,0,0,2f3ea65f0897117e78e2befc54a6f68019a91afb96bc021ee327d756c0942e4a,2023-11-07T02:14:47.930000 CVE-2013-1704,0,0,3fda6254cbf4e28e26234b6f0bbb6636a6dd602bec7684ae5f71087fd13a793a,2017-09-19T01:36:11.827000 CVE-2013-1705,0,0,4dfe68c8fd5c756a8553161e585ec3474d46363dd5cc7cc5a6a6e40ef13dd2b2,2017-09-19T01:36:11.903000 -CVE-2013-1706,0,0,27be779035dbfccacec571c3ec9263e787087bfff166c768abad6857fbb905cf,2017-09-19T01:36:11.967000 -CVE-2013-1707,0,0,56c744e2cee13b0885180c8c0e3f1a36eb7a463cdfc7dfeca868704a84ab9ef1,2017-09-19T01:36:12.030000 +CVE-2013-1706,0,1,7b9933c58d05479d4acd762783248a767a21bd4aee49fb7a32e42c0c381861ac,2024-10-21T13:55:03.510000 +CVE-2013-1707,0,1,a4b14dcda3b3ef37c8d8b683d1a3304858fa5d9bd37bbb11d7542839a37150a6,2024-10-21T13:55:03.510000 CVE-2013-1708,0,0,1902b8bb5494379b4457f82bd9627b7c3c5cce0db511634414a85b7703d5be86,2017-09-19T01:36:12.090000 -CVE-2013-1709,0,0,5e01e354ad96479dfac2be6f5a8c1d8d90e7446a93a5171a5eef1e84e9db14f1,2017-09-19T01:36:12.187000 -CVE-2013-1710,0,0,e09438b734fc5a7e9e0a924779b6e30a5b3c4b347e6e841c6dd21ceef9f72141,2017-09-19T01:36:12.280000 +CVE-2013-1709,0,1,2a2960b4b2b8fa79b4e826bb147ba85019d25a0b5654760ad931dd7ce354d014,2024-10-21T13:55:03.510000 +CVE-2013-1710,0,1,459d48416ebda83ef96ba3c3709047451e7cb0a13247a796b43e849696994b5f,2024-10-21T13:55:03.510000 CVE-2013-1711,0,0,a4c5976082ff2ab6d89c7c0ddd7dfe2f3a65aae4c3d2391528c74faf09513fef,2017-09-19T01:36:12.357000 -CVE-2013-1712,0,0,c6bc869496ec942139273f32f8b655c20db392bd8af3c781bb23eb3546f69f28,2017-09-19T01:36:12.420000 -CVE-2013-1713,0,0,0a63931deb1eabe3d97486eaa6af7c59808bad67e629c7df076b9b5e40ed1d80,2017-09-19T01:36:12.497000 -CVE-2013-1714,0,0,5a4ee836a3b06b9544f5385471eb3d58dfe68f0bdacadb0cb28f0f647107048c,2017-09-19T01:36:12.590000 +CVE-2013-1712,0,1,82cd5cdee65f0b0454705fdfe37b5c58e47bf8e5f9fb576f95148fccb36218a0,2024-10-21T13:55:03.510000 +CVE-2013-1713,0,1,01ce429ae9db030ef204895a1340794923517896dc6cf0b43a58831f3cd7172d,2024-10-21T13:55:03.510000 +CVE-2013-1714,0,1,e4b24ce9a70e677dedbbe23a61d324bb80c589286ed7748d04838b265d969ef3,2024-10-21T13:55:03.510000 CVE-2013-1715,0,0,79fbe78d271517df68b335a64c96a1d0f872d4635a06ef2810a68535a7969115,2017-09-19T01:36:12.653000 -CVE-2013-1717,0,0,3d61a7498d77888cbb499677e772705cbfac69e6d365a18cde48f4a2d8c4848a,2017-09-19T01:36:12.733000 -CVE-2013-1718,0,0,cadb71883390279f1934e4e7453bdc04014182272e88821433be34e46aee9811,2017-09-19T01:36:12.840000 +CVE-2013-1717,0,1,0fd62b782e938b694f28b21ce1a7d8c1544be407bfbca65f5cb0ab047d273967,2024-10-21T13:55:03.510000 +CVE-2013-1718,0,1,2f14a9f7e54a35e822088f00bb20a5c4c8a4acf96db98661bacb185772ddd52f,2024-10-21T13:55:03.510000 CVE-2013-1719,0,0,66913cb0b9b459015cf65159f2326c01d59058b14a5a1031eb8e3c556e2b8036,2017-09-19T01:36:12.937000 CVE-2013-1720,0,0,de3857530e002dfb2d57ce568481cfc86310d8f18ea0d28a05bfb77605b18756,2017-09-19T01:36:13.030000 CVE-2013-1721,0,0,a206e57e1e0c22e482136f637d9847a5ee0040e9dc76cf9e2e46c027b2b1b0a4,2017-09-19T01:36:13.137000 -CVE-2013-1722,0,0,9ba13a5d53ffe75405137c91343ebeb1617e2fffbf628b8902dacedb8502c2d0,2017-09-19T01:36:13.233000 +CVE-2013-1722,0,1,97c69641265e0f8d8a92351a00071fce5bd2ea45200ce736a1501d778e1306fc,2024-10-21T13:55:03.510000 CVE-2013-1723,0,0,00784cdd26443d2d58de15c5e55adf9a74d1a8f86da09d5da12f71ae2c101298,2017-09-19T01:36:13.310000 CVE-2013-1724,0,0,f0203588182d434812c066f1d5f756e8c0f9f3b46ddb96e7fa472fa9fd561598,2017-09-19T01:36:13.403000 -CVE-2013-1725,0,0,4e887028c794d8a8ed5864c4f1227b896e4e612938854b4f5ac42b89201b3b07,2017-09-19T01:36:13.497000 -CVE-2013-1726,0,0,deebc4998e97f649e38e5c1537497e4a151e094d6afefc9c114f1d03bb6a15f5,2017-09-19T01:36:13.577000 +CVE-2013-1725,0,1,070843f37ca3f0521d37575fc9b80f7e1af664513e746e39755f13f26bc41b16,2024-10-21T13:55:03.510000 +CVE-2013-1726,0,1,fe4d13bab46562508c15bcbd1c03b05f1df00f13355c8e99c9b01464f38fba7c,2024-10-21T13:55:03.510000 CVE-2013-1727,0,0,0a674fd55bf51d15a02fe88eedf7d525d3ec8aaca2af7dc1129d674eabf06151,2013-10-03T03:38:56.617000 CVE-2013-1728,0,0,41deb8ebcf9b59ab38c045395c49c85d92db11a456e44d695de484766654842a,2017-09-19T01:36:13.670000 CVE-2013-1729,0,0,39750d95366143bd029ed5a6bc71fb848b1cd76727a7654494422c4e7e83cdb8,2013-10-03T03:38:56.807000 -CVE-2013-1730,0,0,99497412bb3e4a6a0588cb2b87803d7f5ce52758d3a75fd95d30c4e5a7f7c98c,2017-09-19T01:36:13.763000 +CVE-2013-1730,0,1,76a3bb2b92364316f9acc0b88cf6f8895a1f27eb7f1993cbf9180567fcc8632b,2024-10-21T13:55:03.510000 CVE-2013-1731,0,0,9ecb310d20cbc830011e04c0ce613591e33c5f67c36694711e7b601f865befe6,2013-10-03T03:38:57.010000 -CVE-2013-1732,0,0,4b916b0beaf75a3e9280167eb6f78dfee76b4236908f31fa1c60a14d43d035e6,2017-09-19T01:36:13.840000 +CVE-2013-1732,0,1,a8d079e0c945651763edd60392b3254e62703049ff0b81dfa691b113d16a2c17,2024-10-21T13:55:03.510000 CVE-2013-1733,0,0,84a3983b24e38f3c6e9094c42749b5e5932c840d469966a30a29832c28c8eaf8,2013-10-24T23:29:58.623000 CVE-2013-1734,0,0,c084a81cc00ebdd9d9928a432e6017bee64400915b8e7e9ded1df90d8176776e,2013-10-24T16:35:46.270000 -CVE-2013-1735,0,0,6d22f2904b58b1aa70f3a5378f9f2f0e72f17e281f4b4e7cbb14f8e4ec21b481,2017-09-19T01:36:13.937000 -CVE-2013-1736,0,0,d31b9a1e94665446fcf3c88753d45e65ce4bdcf8ff489a4a9d32af92b3f4ce8e,2017-09-19T01:36:14.030000 -CVE-2013-1737,0,0,114a1f370db2317be3a322ca587035efe14ea9073416feb7e2d7a7a38add8f77,2017-09-19T01:36:14.123000 +CVE-2013-1735,0,1,6e739f02492b41d4e8cad35f26286e94172480772a1de261d46eca2a26d27075,2024-10-21T13:55:03.510000 +CVE-2013-1736,0,1,8f1aaf40397f1cad2b8a779f9ce09d1139bf8e2837450103ba2b03b3338c341e,2024-10-21T13:55:03.510000 +CVE-2013-1737,0,1,70ea19cd70997938f017519bb83a58f7435e3fcc3a54b85011ce834ad2d5098d,2024-10-21T13:55:03.510000 CVE-2013-1738,0,0,7816204d1636903b2b99723d9be8ea3079580c16a86c09c048e6902856fe9fba,2017-09-19T01:36:14.217000 CVE-2013-1739,0,0,e12d5fc042edcfb357ef70406399abbbdad060ade447ce311a4d6a762ee2a0a5,2018-10-09T19:33:55.217000 CVE-2013-1740,0,0,467be29097b07dfc83d5ad5a84b5c218a1f3c128a4156073b0a2765b9b418f02,2018-10-09T19:33:58.140000 @@ -60127,7 +60127,7 @@ CVE-2013-2562,0,0,d9481b9092c4ace7b3b24e45d88b7651d1821f0edd252276a302dfc205111e CVE-2013-2563,0,0,c2e1b4971becf7b8b548fc1cfeb991c1f720fc37d793499c533cd4b7efa6855f,2014-06-24T15:29:39.333000 CVE-2013-2564,0,0,76025a88ed0dfb078751d1de1af3a5c70e00f7d963a20e2533730b00629ce333,2014-06-24T15:20:39.120000 CVE-2013-2565,0,0,0a673ed0ec003cdb9f2634b3296adab175d5fa1731c3f8487ab210e0ba3610a4,2019-04-15T19:55:33.620000 -CVE-2013-2566,0,0,c2fe9fd72f6664ee7cc138ac4f4ce2ee69e87471810d115c1d7540289b0ec73f,2020-11-23T19:48:41.097000 +CVE-2013-2566,0,1,eefa971a9938d6be7969f6f7821853aef6d75d4b0ec7212bce71a96b453fa65e,2024-10-21T13:55:03.510000 CVE-2013-2567,0,0,293e649fa95a913c2e781f304caeea5000e5211ce9bcb049534e378568e100a6,2020-02-01T19:00:12.787000 CVE-2013-2568,0,0,5954c6aef2ba8cbead6aecf590fc90eacb259b3a8ecb5c231559293289678827,2020-02-01T18:57:05.027000 CVE-2013-2569,0,0,0b6f5fab4050e932bf480aef8852f9fcd5f5ae960018e0826e9615fa3928dfac,2020-02-01T18:30:26.407000 @@ -62841,24 +62841,24 @@ CVE-2013-5586,0,0,3eb80424d248cf4475f51953e5a3c78d4455626228b2af2cc9354684fc23ae CVE-2013-5587,0,0,c753c851e99c2d041a1064179fc61feabda582e935f9ef2c0430c14349ef9700,2013-08-26T14:58:44.907000 CVE-2013-5588,0,0,8e5c1266d009f8d1df2c0b703fd13afdf377d8194c5863041dadbed5f87a9ba6,2018-10-30T16:27:35.843000 CVE-2013-5589,0,0,e0c668a80e6f02e729ee4b9c5f0c45887240c8ea34154a3af2718521216f6772,2018-10-30T16:27:35.843000 -CVE-2013-5590,0,0,c8e245cb485c4750962ecf3169d5699bedde11f226e3f576ac416beb127decca,2018-10-30T16:26:10.390000 -CVE-2013-5591,0,0,f18fa97f10fb958c32b4cfcce8da52167ecfa5caf7ed77633dbb2edcfa6aa3de,2018-10-30T16:26:10.390000 +CVE-2013-5590,0,1,6a2f19c8681ff843436e79e262c7a9e6a7b9c8cc4f6696f4ee1412a76a5cdb4d,2024-10-21T13:55:03.510000 +CVE-2013-5591,0,1,dca3132d653031bae1231e4ffaeeecb7d79dbb829e3acdd21cdd183db53a528e,2024-10-21T13:55:03.510000 CVE-2013-5592,0,0,56e46c034227aaf0cee4fece74260422f16e5a106b5cb4081fc17b4ace5e3d51,2017-09-19T01:36:48.263000 -CVE-2013-5593,0,0,23753f6daad2c472659073efe94771c7607a147196515bef5e08983177278f66,2018-10-30T16:26:10.390000 +CVE-2013-5593,0,1,839a5bcde7bf21be8ca1d9a45ea95edb3640f552424a99d6b3ef1590919a87bf,2024-10-21T13:55:03.510000 CVE-2013-5594,0,0,8277c9dfce3704df16865be04898189a7bf834ff9b5bbaa70ad0b133fca3b93d,2020-02-28T00:57:54.937000 -CVE-2013-5595,0,0,49e491f626751380e9db63058517ae650e438980f04c8f0282a3168e71d87f9f,2017-09-19T01:36:48.420000 -CVE-2013-5596,0,0,ecb39cba9e60660d3ae6369e2a758ed65cee5412504fac83a8f85c258f873ddf,2018-10-30T16:26:10.390000 -CVE-2013-5597,0,0,0ebd53f1431a8a07fcea2d0d3cb45d365f356dff30c22fc1f181b611a06e97b5,2018-10-30T16:26:10.390000 -CVE-2013-5598,0,0,e7b94e266b140c58bd8f4e9eb933fbb664015d49dd5f86780c4014b71438abbb,2017-09-19T01:36:48.687000 -CVE-2013-5599,0,0,8255d56a6692fa965e3372c0972bf3e9320a10c26d306ca4e28adbb8b6d10d24,2018-10-30T16:26:10.390000 -CVE-2013-5600,0,0,519fd7008868783a81ec067d31b442aacb757cf936126155ea2866d17ede8420,2018-10-30T16:26:10.390000 -CVE-2013-5601,0,0,df5304bbdb44394ddc3f3408240be1dc6af26780b18b53854a9724cb159cd8db,2018-10-30T16:26:10.390000 -CVE-2013-5602,0,0,3a8a6c2414037cbb70a1ba769c39658a2b735d8699fd579ea22ab4841ff0d578,2018-10-30T16:26:10.390000 -CVE-2013-5603,0,0,f054a51b9cbc1dfd88a3b286b2b63b7d83bb8cc3dd69cedb215cfc6d4879a3a4,2018-10-30T16:26:10.390000 -CVE-2013-5604,0,0,5bf552b19242f1a411d160d3aaf4f0d7855f187b3465d6abbed2d675f9f3d8d9,2018-10-30T16:26:10.390000 +CVE-2013-5595,0,1,a059fa9c48bdffa47afb822273de38947cd707224b811c660216261f3951dcb4,2024-10-21T13:55:03.510000 +CVE-2013-5596,0,1,ae600cd359cd2fa0b0f01074161f467296b3424806b3394fb7b27c970538dfb7,2024-10-21T13:55:03.510000 +CVE-2013-5597,0,1,b5a1f86237d7ab6146837386d479b80739e176e727363b8c85ac1aa269cc2506,2024-10-21T13:55:03.510000 +CVE-2013-5598,0,1,4ab4d6b180a2fc682ba37fc6c9d51dcf61e90ebf10408e1450031eb457297a49,2024-10-21T13:55:03.510000 +CVE-2013-5599,0,1,2091f9c9d295952fe36d68aced5d7761b25f26ea32f10aa2f05bbaa6f3f6fa50,2024-10-21T13:55:03.510000 +CVE-2013-5600,0,1,16942673a04d1c3bd7d04705d648b4a017ceefc863088cb556866649a78248c1,2024-10-21T13:55:03.510000 +CVE-2013-5601,0,1,d88a1134f4dd655a7b948c225735a002ab98df7be16f10583dfcbbf45a7857a8,2024-10-21T13:55:03.510000 +CVE-2013-5602,0,1,63c6b769ba22b200878645fa48b2e47abe9bd80c2f45c7429df42f9c9fc8df10,2024-10-21T13:55:03.510000 +CVE-2013-5603,0,1,8fd0a330cf2c3fd9841d77cc1be4ca58c7a89e6d7f42f07003f16a6fa88b0b28,2024-10-21T13:55:03.510000 +CVE-2013-5604,0,1,136caefa62a5472b7d37e15bba1ff670ba4e9559d4fcd5587789fd794196ab67,2024-10-21T13:55:03.510000 CVE-2013-5605,0,0,7f67203b954d08470ce0f45869b945a9056eef7858672df23ffad8f0c100829b,2018-10-09T19:34:32.220000 CVE-2013-5606,0,0,497f6aeccae3c8183c05de5f8f2a74e0761fd218f94bd54e233c92bbb5132129,2018-10-09T19:34:35.673000 -CVE-2013-5607,0,0,1148cc6fd245ef6d357d65a158fe1b6985bba7d29d7204ac2687e04b76c453d5,2018-01-09T02:29:04.690000 +CVE-2013-5607,0,1,3574ae5a57d298b6fd514497a0c3388534d2da9739efaee9825d7b5347e89bdc,2024-10-21T13:55:03.510000 CVE-2013-5609,0,0,42a10ebebdab645056025beb52c4082598630c2a3b754b83eadc225bbc8d1c39,2020-08-12T14:42:05.457000 CVE-2013-5610,0,0,7aa35605d623f7dc667bcc58646b376e3c4883baf4c141411d6db68ef40873c4,2020-08-21T18:43:46.997000 CVE-2013-5611,0,0,7d233042624535834a403324d7b743fc390e8ff0b14a877bc375088bbf1c7853,2018-10-30T16:27:37.297000 @@ -65980,58 +65980,58 @@ CVE-2014-1529,0,0,5d4e10651a7f53cbd323678decae65e770af69e3fe0543b17d6b7da00845d5 CVE-2014-1530,0,0,cf03f172ddb86383fb837d3b7d316262ea1fddee9a46c961c75953699da965ca,2020-08-07T19:19:31.757000 CVE-2014-1531,0,0,8d5644cfacb4d1e8f812fd9e7aa6ec87b7a24a66e490b1a3b34259c76530098b,2020-08-07T19:26:56.563000 CVE-2014-1532,0,0,75e4ae9e3bf8c2431aeedbd453e6608347f06bb93efa41bda7bd04835f2dc515,2020-08-06T17:57:46.167000 -CVE-2014-1533,0,0,726ca9573b96a9869925f68e1a8dce47ac12d3b43d5f68eea8159a8d960bc34b,2017-12-28T02:29:00.537000 +CVE-2014-1533,0,1,24cf14c5351e5fee56d172858d1ca18a6bef92e018f6badaa121e31dccd28058,2024-10-21T13:55:03.510000 CVE-2014-1534,0,0,3c610e910574867bc570bc8f94f1d225b76151f4711ffbb8ccc1ff91e8b1209f,2017-12-28T02:29:00.643000 CVE-2014-1536,0,0,dc8cd17ec938d91bb0dfe63a2cd502a7d66f1b1564d4e784d7c61dba1df776f4,2017-12-28T02:29:00.737000 CVE-2014-1537,0,0,c06ac13603d9b522e304e82b679eb8153050a5bcd9dc225d54f0e013b1e6ca76,2017-12-28T02:29:00.817000 -CVE-2014-1538,0,0,d260ec5097f291c8ee6ee298f1a19b96bb80915c2bf0686610c6e048651c9e82,2017-12-28T02:29:00.910000 +CVE-2014-1538,0,1,d15a4208c3515715ed961028722c0333d013682c5cd4603233a649b96e86fdbf,2024-10-21T13:55:03.510000 CVE-2014-1539,0,0,9c516c7c5c4f61164d4e90db593af1101e3733287e159c6cfe97e26fc4c10a8f,2017-12-28T02:29:01.003000 CVE-2014-1540,0,0,df54a63bf79f4f44d0de6e4c499434cafc4add3f6f007adf7e2741a7b9244444,2017-12-28T02:29:01.080000 -CVE-2014-1541,0,0,b69cc4c6e08b2f989d957adede5fd91fc1c12828d3c40dab45d09745d16ac5c4,2017-12-28T02:29:01.177000 +CVE-2014-1541,0,1,559a0e12aa16783bfdc3233f30256048eb91d51f45a54fa2d916bb05802bcfe1,2024-10-21T13:55:03.510000 CVE-2014-1542,0,0,82f811ef6298ec4c3161d3efa4bc03a005ddec796fe4155c9af409131341d8a4,2018-10-30T16:27:37.297000 CVE-2014-1543,0,0,f7ecd4da0ccc04070ce0b7e147df21b554a13c05fa019a2ffd789fc32dac19b3,2017-12-28T02:29:01.330000 -CVE-2014-1544,0,0,7ca195d0d8bc564f96db105b3c518d8f0aeda892a52f788b3a192b1984f7f750,2017-01-07T02:59:38.673000 +CVE-2014-1544,0,1,789d1d591fe198554bac197e6728f400d7f1e0c67d3ce709b25daf84687bb52a,2024-10-21T13:55:03.510000 CVE-2014-1545,0,0,a4cc1a111ffdccfe60233a01315832b1477e0894358bdd8720697f3433b14921,2017-12-28T02:29:01.410000 CVE-2014-1546,0,0,534c791e7de0d577d9f91bae76d0f77c725d2056b26f5df5858b97962762feb4,2017-01-07T02:59:38.783000 -CVE-2014-1547,0,0,edf7ebe4e4ec1798af8bebab5a26d01776389cf2465d515be57f23997dbb4ca1,2017-01-07T02:59:38.860000 +CVE-2014-1547,0,1,5e4de7df001bcb428da0f1da71cca4ca52a9b2834b6010c8b3d4122525290acb,2024-10-21T13:55:03.510000 CVE-2014-1548,0,0,eb08425b04170eaa5f9328d8b2cda9b5ceb95ac3e2b6ac61f8a84cc9852d4a64,2017-01-07T02:59:38.987000 CVE-2014-1549,0,0,91fcf1d285ad2fce372d24d91ebaa7f0ba7fecd81d1413372a1ea81d7e4dde67,2017-01-07T02:59:39.063000 CVE-2014-1550,0,0,1fe603d979b1c0b82d32eb1f87d0e23f64187b40b287d823c4103998c7ceb1fe,2017-01-07T02:59:39.127000 -CVE-2014-1551,0,0,09d3ce611da89c88f77fa2f73e481600816732c2d3e9d6bbbb4079536e057e39,2017-01-07T02:59:39.203000 +CVE-2014-1551,0,1,cf22c4bb28b5bd1b85603fc6a6486de59f7a2d1a6f9365a74ee8bbe7d0e385ca,2024-10-21T13:55:03.510000 CVE-2014-1552,0,0,0bbe7c1710f4790f707abbfda8bc0ab25a1893da868a150437b407f1763368a1,2017-01-07T02:59:39.267000 -CVE-2014-1553,0,0,8609d200899aab61d07c2472832dbd40e17cbb282ba7883db0905958d75f3234,2018-10-30T16:27:34.687000 +CVE-2014-1553,0,1,5db25029662c9482a959ca3a1005cb78a319f8f3f95500ca6dfd5a6a2523b523,2024-10-21T13:55:03.510000 CVE-2014-1554,0,0,23116983e21e9e07e173597ea9fafb68b50e71f0de86ad1c9f8e75d9ed8a6d1c,2017-01-07T02:59:39.487000 -CVE-2014-1555,0,0,192102654efa03425c43fcecceb13dd897b3e692e41c075fe9bba4648f81d317,2017-01-07T02:59:39.580000 -CVE-2014-1556,0,0,5fedb258a4480f6fd84822d6dae8f3f1f4d7d9851e6221e0c7248195c0b31b68,2017-01-07T02:59:39.687000 -CVE-2014-1557,0,0,7c03bfb9e5e212cbb347a3fbce82be1c8e15c73b0433fb53fe5a891822ea8a21,2017-01-07T02:59:39.797000 +CVE-2014-1555,0,1,05e984f2ad1e0e31c0b73d0a3ffca2294af185a4c52e3736c49657db87836cfc,2024-10-21T13:55:03.510000 +CVE-2014-1556,0,1,63645120d6a127df37566bd2d75a45f27ff9dbc81f68ac83720fa73968bfb9aa,2024-10-21T13:55:03.510000 +CVE-2014-1557,0,1,5ba4fcf41c30a4ce62164b90723e18df4bbb92f687436798df3eded0e67aadf0,2024-10-21T13:55:03.510000 CVE-2014-1558,0,0,2d48b99fc0c772d16c4278ecb309067462c034b55fb46d69268232de3757f6d0,2017-01-07T02:59:39.877000 CVE-2014-1559,0,0,165b92c29b9c1fef00a6f6dab707b79893d5a779ca7e1989aadb27a35001b1c1,2017-01-07T02:59:39.937000 CVE-2014-1560,0,0,db64549e9cc096a9f41b65e9ff698e399a5d8e26df732574bb42fa2302ee9fbf,2017-01-07T02:59:40 CVE-2014-1561,0,0,239b15bf125b83578c213897764f6158314134eca81600f1dba5b73bb526ff6c,2017-01-07T02:59:40.063000 -CVE-2014-1562,0,0,bdca5c698b8413436b0a32f0387571c038eb72d6c7e712554e2acfba73d633b0,2017-01-07T02:59:40.173000 -CVE-2014-1563,0,0,b5c35ffeba633a37111c4ad9970975831480fbf31d526d8876e2b3934c707e32,2018-10-30T16:27:34.687000 -CVE-2014-1564,0,0,ed9b3281a99b5ad10dce9073ab58d3b5b8a81bc25542fcc674d03a2484cbe56c,2018-10-30T16:27:34.687000 -CVE-2014-1565,0,0,3caecfa34d6001dee204d82d92bee596a8c8e56e5e0447419de17792cde31948,2017-01-07T02:59:40.687000 +CVE-2014-1562,0,1,e7e2a9fe729a37e889cd624c217fa2aafd59e276c0c028e537218cfc1c4185b3,2024-10-21T13:55:03.510000 +CVE-2014-1563,0,1,00e893d9f2d6345814af6cd07d285e9b25c1b2cc53b074fe4bb833c9c2e96653,2024-10-21T13:55:03.510000 +CVE-2014-1564,0,1,89b9f8b1622cc43ddc8889bbf9a1b907f8b1cbe4817e89d004a511eea98056e8,2024-10-21T13:55:03.510000 +CVE-2014-1565,0,1,2046eb3b828ef245026f5d4fb1bf97f1129b18dfbd734651b57def557ca28bae,2024-10-21T13:55:03.510000 CVE-2014-1566,0,0,688c8c8d42b4f8f1b9529b2c1210d35bb964268771ecf21a2eec7196c5ffe687,2017-01-07T02:59:40.767000 -CVE-2014-1567,0,0,1fff9ef6e1412857c71c3a9c2a3458273c07fb8285578df925aa216164a16fad,2017-01-07T02:59:40.860000 -CVE-2014-1568,0,0,7b60fa7ddd7e1cb5be9b65a211b8548219e0df61892d9fca509eed10cc65315e,2017-08-29T01:34:25.843000 +CVE-2014-1567,0,1,8b12cd734341fb394545133e7702f30fb89d1238400d9794a45daa2aa7a305d2,2024-10-21T13:55:03.510000 +CVE-2014-1568,0,1,b6c1b2b3bdff25d637bf96fe1f446de7fa99451a10874c623bea64218df56339,2024-10-21T13:55:03.510000 CVE-2014-1569,0,0,471462b1aee3aae3258bda5cf0aa23905ecf7a64f5e7909126cfe63b35429d9b,2017-09-22T01:29:00.890000 CVE-2014-1571,0,0,ca82753f86190fe8c2c6a845ed3a8bf4d5621352d67ab46ad6d124fa28944ade,2016-04-07T20:57:14.697000 CVE-2014-1572,0,0,f8d6f284c38ed53b7d7d46832035ba142a76796e5be9a5e3e140dec22b1a6799,2016-11-28T19:10:47.787000 CVE-2014-1573,0,0,1fadf02e369d263f8e9f94005e73317dcf8d3b4fe12f9c4325bf973cdc2a2b1a,2016-11-28T19:10:48.973000 -CVE-2014-1574,0,0,48f00f07483bc3fcdd95368029961d0569900a687e0f28b4c5c535c3ec9c4a10,2016-12-24T02:59:01.197000 +CVE-2014-1574,0,1,d1b535a59aa071c10679f551f35b2ed2662d5b40ac76b8ceb86cfc1a1d703e90,2024-10-21T13:55:03.510000 CVE-2014-1575,0,0,048434b986018717fbebefccb08625feed58550535cd196945cda5cf64a24386,2016-12-22T02:59:13.483000 -CVE-2014-1576,0,0,b78c0675c2eafc0c5cbb4331d92e2806a100d14e0faa946f4faf0f05adc461fd,2016-12-24T02:59:01.290000 -CVE-2014-1577,0,0,eb76433d27ba4452e1452d8749754c40cd6ed4315627e4f38cabb44853576001,2016-12-24T02:59:01.367000 -CVE-2014-1578,0,0,09f16ad659ab9ab5974736b61ea6ff252ce7f2ff9aa3c4509b10818847bb9d3e,2016-12-24T02:59:01.460000 +CVE-2014-1576,0,1,08f97041b67b2d4e706750515caca56d9c8a0ee933e4a124106a936662a2fa15,2024-10-21T13:55:03.510000 +CVE-2014-1577,0,1,51eb40cb04baa9be98cff17abb21de7de518c270a644a504450083def66a990d,2024-10-21T13:55:03.510000 +CVE-2014-1578,0,1,d249c92699120347dcbeb8844ee8c238235d96cd3e51b9a44d5ecd0a1960d239,2024-10-21T13:55:03.510000 CVE-2014-1579,0,0,1bbac181d8d00c61adf3fe9bd4b0faa1cfd847732c10d9549b4203e740a54059,2023-11-07T02:18:58.770000 CVE-2014-1580,0,0,8f27cfb5115e897665ed099c69e9a9c9d27d3b1e2b7dec2c4ec94e8c2ad6d2f6,2016-12-22T02:59:13.797000 -CVE-2014-1581,0,0,a3a6008e14a487e5bbf2c952e50c11d7966414d98bcea568e2b63018ee058f00,2016-12-24T02:59:01.540000 +CVE-2014-1581,0,1,d72a598f830fe9df929063d7ddecaf5e1287183b3f58aa208b1a5b99db1ce669,2024-10-21T13:55:03.510000 CVE-2014-1582,0,0,c4cad9ccd7e552459d925736f21c8139c2578a8a010df88d07e8fed908223b6a,2016-12-22T02:59:13.937000 -CVE-2014-1583,0,0,99c5934ac074bef4eb73fa3969611c1b873d635d0748690f6f9171db679d3e95,2016-12-22T02:59:14.017000 +CVE-2014-1583,0,1,993fa480df2b3898d18dc71cb7b9e2b2d15701d0a260fb01f5a2d5bcc97ea8ed,2024-10-21T13:55:03.510000 CVE-2014-1584,0,0,99f28f335d0ee751ce0c81a9f1d56458cd970a3a09a2854ec8c0217a065362cc,2016-12-22T02:59:14.077000 -CVE-2014-1585,0,0,6abff081c04289fd91993ac59e936845e0318af3e0dab38a2cf6aa54f9facfc8,2016-12-24T02:59:01.633000 -CVE-2014-1586,0,0,0cb6cb6920b8670cc8150d4b2d3be63dc6597c9e4f486d8c86ea1ce335b0c8e2,2016-12-24T02:59:01.710000 +CVE-2014-1585,0,1,88a9c7c7154b4fd1b0ec694528afaa80afc6afba346fb8222fc5553755bc3097,2024-10-21T13:55:03.510000 +CVE-2014-1586,0,1,798b59ce05658e1d3e2199f246a83306d37604d7ebc03a38584282b625e83cdc,2024-10-21T13:55:03.510000 CVE-2014-1587,0,0,0a598520518390bad7040fdf3dc4867e836346adcd84b0bcadc56fa1e7fdbe6e,2016-12-24T02:59:01.757000 CVE-2014-1588,0,0,d3a896347dacc1ddbe2fc458d122eeba9c4e2222af54058610b6ac906d6d0235,2016-12-22T02:59:14.453000 CVE-2014-1589,0,0,f01316cbc3788236118b968a8b84862aadee413fd78c493027049e5ad071b2f8,2016-12-22T02:59:14.500000 @@ -66040,7 +66040,7 @@ CVE-2014-1591,0,0,0b4193cfce2a36ee5ed165916a40dab7e91f7fd924843a6bfdec40e6a57132 CVE-2014-1592,0,0,4f584ff68a7b44f3a7c91870bc38ae6128c4ddd5fcc3f0c8f2f3c7b8af909da4,2016-12-24T02:59:01.883000 CVE-2014-1593,0,0,65a6bd1d8dc064aacd5da42bb60ae7174ef608475c4c439b342a3c563ce117ce,2016-12-24T02:59:01.947000 CVE-2014-1594,0,0,71f863ab4ec8a3340d9fe9d6ee711e9f7281bcee3a7e6a7af24d5150078e48ee,2016-12-24T02:59:01.993000 -CVE-2014-1595,0,0,1b40f3e471c28df27f9e3b978fe5c665215c9844e11e9d351f380a1324559402,2016-10-04T02:01:14.747000 +CVE-2014-1595,0,1,0558f16ec7d41e1e96c79ae47c447ababa62338bedf4a830f829a7eb33893841,2024-10-21T13:55:03.510000 CVE-2014-1596,0,0,0eb7ae4dd34c6c1bc6fc97da971bda7d6eb14be475034cca51f447f3b45eca15,2023-11-07T02:18:59.167000 CVE-2014-1597,0,0,6658b96c55d9c437d5f7d62b4fa48f333b51ea1fc4a1963e48ef4e916999a031,2017-08-29T01:34:25.920000 CVE-2014-1598,0,0,86f5d71d3081884e796c0c2dc8619fec5ce0633bafb3999e36e8c561b67b57e0,2020-01-10T18:20:07.793000 @@ -72300,14 +72300,14 @@ CVE-2014-8629,0,0,22f44855a853ed931ed4945cbf74c42efb06f920e3e1e691e64d3598b54b15 CVE-2014-8630,0,0,56ab85f8483bc81c08baad67cdf626b978d4ce2cd1620249c7e825ea105d34e3,2017-01-03T02:59:20.563000 CVE-2014-8631,0,0,71e350b8d312f58e9c0ee511ea675718743114b3b88d9be16519f193e2763b0e,2016-12-22T02:59:19.737000 CVE-2014-8632,0,0,8e9ebe1e1096e52bf8f9b9224bff045564340412ec48cf385c864797adc961d7,2016-12-22T02:59:19.783000 -CVE-2014-8634,0,0,30cf450771fd0b008ad758cf90e097d0ef1a443f158574e57cfb97182f61925d,2017-09-08T01:29:25.933000 +CVE-2014-8634,0,1,a00c2fad938e0a36a0e0246f6a5f7000a905f2385ab66f669e670b9fb444a773,2024-10-21T13:55:03.510000 CVE-2014-8635,0,0,d931b22e866f9db25934bffdaeb5f755426d00d622fe4f8cdfe325460ce5a3b3,2017-01-03T02:59:20.860000 CVE-2014-8636,0,0,949924c17556b8cb58e8e160bd7d5acc278d8709bc858d7ec6373d895828a9a8,2017-09-08T01:29:25.997000 CVE-2014-8637,0,0,38cb2144ea48d3c4c3e18e9af734924b0e5e81d314d99a9c9adcb2dc152ff59d,2017-09-08T01:29:26.060000 -CVE-2014-8638,0,0,5546f03e4d84bf4a1bdef0ee70e0c270829c27e78eff4e4c75e90ff9b2c907ca,2017-09-08T01:29:26.153000 -CVE-2014-8639,0,0,bb3341a5d3039e1b34d273ffd815dda15ad6aac9c7b9e035f03e52f3c6e2baed,2017-09-08T01:29:26.247000 +CVE-2014-8638,0,1,9fa7e4122f41f12321f5eda55dcb8e33a94accb82038cd3d3e4be0552da4eef3,2024-10-21T13:55:03.510000 +CVE-2014-8639,0,1,9da3b56b07489bfaf9ce8731e6277aa14669a5c240890db4695a4e4aff1f088a,2024-10-21T13:55:03.510000 CVE-2014-8640,0,0,7c57dd1bf65ae55a78d9b10d3482699e0474f89a0456eb3672880e2d7e1f276b,2018-10-30T16:27:35.843000 -CVE-2014-8641,0,0,a5030f19c66dfb69b21e761c0b32e075f0f0910a298e103c4d6105387e5a6afe,2017-09-08T01:29:26.387000 +CVE-2014-8641,0,1,31e8eb0e9546c3ce8bd054cf10c14f4c1fd2e1528d1c5706244f79a7a939ed95,2024-10-21T13:55:03.510000 CVE-2014-8642,0,0,ecb94dc0ce3bd8cec93da37a6d3656ed85fb8c39b5eb5a6e0101e1f4273240d1,2018-10-30T16:27:35.843000 CVE-2014-8643,0,0,e883bbea3065ffccb52ced5817b625aaf5fab4bf77558aaa730210ee7aed35e5,2018-10-30T16:27:35.843000 CVE-2014-8645,0,0,ce726cb490bda2b5876610e9598c72e450ecbfcd4f0cea59a819932e36bdec8d,2023-11-07T02:22:40.350000 @@ -74243,13 +74243,13 @@ CVE-2015-0797,0,0,71649586753044a315903f8e44590ea061496c7ba018b77397522e7b011bf6 CVE-2015-0798,0,0,bb012d0b5cd368d580ce1a7fbc6e1865968bed2da5eba801859cf43f3b1cc906,2016-12-07T13:36:15.370000 CVE-2015-0799,0,0,6a2cfc2bf60f4cb3c593ae81d986025908a834da748c47342e9dc7ffffe2a594,2018-10-30T16:27:35.843000 CVE-2015-0800,0,0,a343e278cfdc8f7bb3ac08c048ec3b4f9bcb566d0232cfc13ad1ae10224901b9,2016-10-04T02:02:07.240000 -CVE-2015-0801,0,0,2bffabadae4d56f7bca822104ff15369cb2f5b97857d8240aaeffa586caa6a59,2017-01-03T02:59:43.177000 +CVE-2015-0801,0,1,5f1528f6d9ebb1d28602bd744bb6c53f4493acf2d4d8f695abc4de2cdf478f31,2024-10-21T13:55:03.510000 CVE-2015-0802,0,0,1b36c5c581b7e5b7a2c0b361c8af4357d82d1153fb982c92f9cd9ed4e2cd9677,2018-10-30T16:27:35.843000 CVE-2015-0803,0,0,6274c073ee1512d14899701d88a980e3d819b2591b01b97dbd72f5e59f6b0a79,2018-10-30T16:27:35.843000 CVE-2015-0804,0,0,f4e2d13ea18b8ae30fac9a282a36578ba00ba9fbb873f21550eb4fe314c42530,2018-10-30T16:27:35.843000 CVE-2015-0805,0,0,9554f0d3f58258e9b46d7b126dc9f07b8fbb63bd0e6f2742bc65653cc72171cd,2018-10-30T16:27:35.843000 CVE-2015-0806,0,0,dc429eeee890032267b5f455f233737749bbf9efe9080d74d5f0268e61c55a46,2018-10-30T16:27:35.843000 -CVE-2015-0807,0,0,c85fc278d53391fbce5cd6876e65e8d5d400f70735e5a0a54be2dc0691591bd3,2017-01-03T02:59:43.270000 +CVE-2015-0807,0,1,9a63af7fe942b4c89bd6aba362e5bc5d523a8a4a945c3dce789aea4775c9ac55,2024-10-21T13:55:03.510000 CVE-2015-0808,0,0,62433af11112563b7b005c68d386b51e3fd3dcfef74ade4afa4d9252446764ea,2018-10-30T16:27:35.843000 CVE-2015-0810,0,0,a3fefa2762dfa4f7c4d903e3c8797abd6f23fdc125c88dd43aca154d9465ad29,2016-12-07T03:02:20.887000 CVE-2015-0811,0,0,d21fe4ef01233c19c5a2b531d2b95139e7883fd2f1932c5b10be1b81a46c0276,2018-10-30T16:27:35.843000 @@ -74258,26 +74258,26 @@ CVE-2015-0813,0,0,a77c914b7dce4d878de1cf0a86e8a8fcc5b10178558160c4cc8bbcb40aa028 CVE-2015-0814,0,0,038804910e75fddf10d24ee520c6ffc40b3e9e62816d039217dad65847a69099,2016-12-07T03:02:25.137000 CVE-2015-0815,0,0,716b6496c64cfdd5653570bb5eab6b681c415fa79cdb679cd3c4ab25574d1f6c,2017-01-03T02:59:43.410000 CVE-2015-0816,0,0,709ec1118d875aacf3f7ec1526830989504c7f05895994efeb8e3752d0564191,2017-09-17T01:29:01.170000 -CVE-2015-0817,0,0,282821e6e118b51bfda2b4fb432b17f06a50cdaa3a2c6eef6192e06ab7f0433a,2017-01-03T02:59:43.567000 -CVE-2015-0818,0,0,acc4a803cf7425d737db959656044fc9e5b6255a205aaf55c6f8a16baea9c50c,2016-12-22T02:59:27.597000 +CVE-2015-0817,0,1,27f020554354cc71f96b74c696eed2450cd4fd794472a76138fa079095d6897d,2024-10-21T13:55:03.510000 +CVE-2015-0818,0,1,ce64c7863ff6ad9011dca1f0b7733cdfd209c1dbeba3a0211ca700dbee24347f,2024-10-21T13:55:03.510000 CVE-2015-0819,0,0,912b1376c6659d3044b027ec425f1927a2b8497650b63ec599cef951103c41f9,2018-10-30T16:27:35.843000 CVE-2015-0820,0,0,71521924f415cf6c53c3fc2784ca4a7e5544215bddef148051191d1677279d81,2018-10-30T16:27:35.843000 CVE-2015-0821,0,0,fcab832e15bfcae1828bf5747f68aaf816ac6bd9c2f1215f70ae49d4c69dc6af,2018-10-30T16:27:35.843000 -CVE-2015-0822,0,0,3e42df633748a0f7ad361994978a6f9cb589f598caf8bdf87e76de8a3350a3d6,2016-12-24T02:59:05.790000 +CVE-2015-0822,0,1,10737e6144393ea4af18c45c4eae2f7e348a5aa3783303634d548e3554c173fd,2024-10-21T13:55:03.510000 CVE-2015-0823,0,0,48e08e99c5cdd7ad60a73409ae0b6eca5022d7a76ce5414436ed1fc7b2f81369,2018-10-30T16:27:35.843000 CVE-2015-0824,0,0,17958a13540c2b6e178b920289abd3e90ed9913e4b7344aadb37986c0032150c,2018-10-30T16:27:35.843000 CVE-2015-0825,0,0,f8bcd99a9e5c87942cffd3e3d1a75bade9a514539c05571174268481a3a15a13,2018-10-30T16:27:35.843000 CVE-2015-0826,0,0,8a37a2cf5f0ba93a8fe4bf656c7d03c0ddc96f867d015fb6b08e8d24489ea328,2018-10-30T16:27:35.843000 -CVE-2015-0827,0,0,a58c068da0895108197c089242e40d46a425da6edef23caee6feaa3f2804c529,2016-12-24T02:59:05.917000 +CVE-2015-0827,0,1,8b91a4c756ac13886cdc043d53b052d2233a919e49c5a5e68a88f0306fe8833e,2024-10-21T13:55:03.510000 CVE-2015-0828,0,0,6968bedd3f3062b98bf0996d9ca9b4a621a3b67fff2863375bbd62052c1ff516,2018-10-30T16:27:35.843000 CVE-2015-0829,0,0,00c6c65b16cb62f843685d133dc7717de22f6c85c679544aeb264cea7b7c609e,2018-10-30T16:27:35.843000 CVE-2015-0830,0,0,b4931d5271f135e8e943f37c9d619765d3cb4327a493464fa39c77fc18932d19,2018-10-30T16:27:35.843000 -CVE-2015-0831,0,0,1296209ad94ef6e9ec105546a30dd2395e99d7c9dbd73fc2d6061ea58617c9ec,2019-04-22T17:48:00.643000 +CVE-2015-0831,0,1,c960ac93ed7152feb9673d7f9979876159a63810f2ded9b680fcc649182dd837,2024-10-21T13:55:03.510000 CVE-2015-0832,0,0,ec0e0834605d6d2a3763caa28288389146b4a299b6b0c05ad2950d0e80bef696,2018-10-30T16:27:35.843000 -CVE-2015-0833,0,0,429de174990b4328c801599067517174ef42e5c1c4829b2e5edc875cecf70a1e,2018-10-30T16:27:35.843000 +CVE-2015-0833,0,1,464fbf6b304dd4001afc79cb32b362470c281e2f3167c24ff00bfbe4d11a1096,2024-10-21T13:55:03.510000 CVE-2015-0834,0,0,734c3eadd3bb28eb02033954b36254382865a06e18d0281d458a8cdf6ec38827,2018-10-30T16:27:35.843000 CVE-2015-0835,0,0,5a6f7e579a8bc55dca51cf66bf89e30d1f2fa3a6443e8d589154aca02a53b4d1,2016-12-22T02:59:29.330000 -CVE-2015-0836,0,0,fc3020e3b2d387f04b4850d477ff043184c857b4caa666634e2078b65d2b8ecb,2016-12-24T02:59:06.227000 +CVE-2015-0836,0,1,10d29b4b7537f6a1799eda96787fd57efaec9a01c1c04b1a0c4a7a6351b43158,2024-10-21T13:55:03.510000 CVE-2015-0837,0,0,c2e9e15b846996d05861a3845e8b25334b083794fde75e8e4aa66a306223a998,2019-12-14T13:59:09.573000 CVE-2015-0838,0,0,69e74d27e70af955fd04d7e7c07a2341c4f4710c12662b14c59ab18bae69232e,2015-04-01T03:09:39.097000 CVE-2015-0839,0,0,099290d14ce6e472d78b30f974db9fd0c45b0deeaedfcd6e0c3ee761b15793b9,2017-08-25T11:42:07.007000 @@ -76124,40 +76124,40 @@ CVE-2015-2702,0,0,ee6e431581b8292cd49ef906507f9761acc99697fcaaab93510fd342f0d202 CVE-2015-2703,0,0,b49d5b9cd828456bda9a45bcd762d03340b982bc6148bd01cfbc3e0b3dd3a7e2,2018-10-09T19:56:20.343000 CVE-2015-2704,0,0,ef9b16096bf20f05ec47c72c1ede5c8d56b2e5468de597be9fc02a9c4a318d89,2016-12-03T03:05:48.987000 CVE-2015-2706,0,0,0facd706ba8221ac160642bbef61015e33d92196c0d4bac6e8eb4f24c30bf4e2,2016-12-07T18:10:21.967000 -CVE-2015-2708,0,0,0d28a6962aae88daf5ab2e78eab1a4434c7a0e6449cc4885fd7f13a02eb0e445,2023-09-12T14:55:31.563000 +CVE-2015-2708,0,1,15678d6c577320fa2c8cc65240c9437d297ee64f0745994c15882958688fd47a,2024-10-21T13:55:03.510000 CVE-2015-2709,0,0,1ffc80eb346bbf58b18be5cefd70747f43e824863c5ea7a7c1aab92bb8cad525,2023-09-12T14:55:31.563000 -CVE-2015-2710,0,0,d3d803ec849e72196f6dc5a1033b0b9730ae2b64c576e67270bc010e5b7d8f9a,2023-09-12T14:55:31.563000 +CVE-2015-2710,0,1,683e39bf8d2bdb9793f23c76493aa8509ba2d46a0aeebab70975d74bb29651f3,2024-10-21T13:55:03.510000 CVE-2015-2711,0,0,7ec0f8ce54b6d5062984f61a0548a309771ea33bfecbc0fe182e89f75ac69800,2018-10-30T16:27:35.843000 CVE-2015-2712,0,0,164a8230b4f441bcd76b5003463026ed0413a7127798651d8b70b8b9324e19f9,2018-10-30T16:27:35.843000 -CVE-2015-2713,0,0,61ac273abd3c3f6e96d2494e0b979e9a77359e69cba510257aa5aa3ea4f6f747,2023-09-12T14:55:31.563000 +CVE-2015-2713,0,1,b5754e6c5ea6f3eb0e5b3f773972d3152019253bb732a7025cb0cb72ff9a7ed3,2024-10-21T13:55:03.510000 CVE-2015-2714,0,0,975afa921e9d9b01cea679b2739f470bad6d77aa6d69e8b37837270fdb54389b,2017-01-03T02:59:54.333000 CVE-2015-2715,0,0,9f6e1432a834c549acb97873b101c9b589ebc03e9143f6d0e0c0a1551fa381a9,2018-10-30T16:27:35.843000 -CVE-2015-2716,0,0,9ac6f52af28b91a1f9444cea83b48cc624ef45eeb97a3e67cef615a9a7aca609,2023-09-12T14:55:31.563000 +CVE-2015-2716,0,1,b35a8007a6b127ae60582134778450f047a88da6a0a4a676431db3579cdacbc0,2024-10-21T13:55:03.510000 CVE-2015-2717,0,0,3ccbe0bbced6a9a67f52ffeabcab461c21c9ead41e4f4f9ad2e4d9f250dff7b5,2018-10-30T16:27:35.843000 CVE-2015-2718,0,0,87eb531bce59d0e8fb2863e396563365f7f0293909e44e1cb14172a44e158f33,2018-10-30T16:27:35.843000 CVE-2015-2720,0,0,8f1def5c00c8fe39093cd00716889421f0346ec85c15c1e5ecff841ce0e3fbb9,2017-01-03T02:59:54.803000 -CVE-2015-2721,0,0,06cb6b44fcda719ff95dd1288aba7b4393262f50d91b5883a35bd94877193f50,2023-09-12T14:55:31.563000 -CVE-2015-2722,0,0,c8a66fc89389dcef1d5b8ffa427ef0e743aeb884d9b806111a6caf746f6fd08b,2023-09-12T14:55:31.563000 +CVE-2015-2721,0,1,b95cdff6c3a9a5308b468ebb001a2cc5c84e852c31d5dc236414f6d4db18043b,2024-10-21T13:55:03.510000 +CVE-2015-2722,0,1,5b77031929f7da60eaace577313fd0a00be36f1d9c9d75cdeac5f11eb3218512,2024-10-21T13:55:03.510000 CVE-2015-2723,0,0,826a9754781c8f2a29bcdc4db523b4db7be490dc76361391282d6dde5f6ab7c0,2023-11-07T02:25:25.303000 -CVE-2015-2724,0,0,0069d3928908e524021398d612a15c3f9fc96544c26b9c081e91e67dd8b3b4b7,2023-09-12T14:55:31.563000 -CVE-2015-2725,0,0,d804e4790ab1de9dc2399a7ec4a0eded14e79c50b654e973ebf8e66bee09f3f3,2023-09-12T14:55:31.563000 +CVE-2015-2724,0,1,b875910dc64f76ebc079bba03b63b88db108ce4cfd628f058ffe7ecc1ccd074e,2024-10-21T13:55:03.510000 +CVE-2015-2725,0,1,3f75de08eaf823a62a15db6db5e8f1164697bdfa92a32b1ea83fac81b571b72f,2024-10-21T13:55:03.510000 CVE-2015-2726,0,0,3fcf20703807c402a73469a43c4a107dc7e41f5ef745d317a779fa3a6bd60afe,2023-09-12T14:55:31.563000 CVE-2015-2727,0,0,36caad0cd68f4368f202aeaab0b0ccd34728b1c4e057fe81bcc61cc10463f3ca,2016-12-28T02:59:08.447000 -CVE-2015-2728,0,0,27ecf0f9cc59362be1999df24e1290deb9d6e84c0942dd76304c832b7b25c483,2016-12-28T02:59:08.543000 -CVE-2015-2729,0,0,0fd98e0a1a005430ecaf29af8e76d433100e58b3c50cf726e672cb19fbdd9408,2016-12-28T02:59:08.637000 -CVE-2015-2730,0,0,ab6434e3a44bdb760665652764d5ab50dbf3d30d94a56ca0ccc5027a5bbe01f1,2023-09-12T14:55:31.563000 -CVE-2015-2731,0,0,d9cd43581eeebe16c9ff3f615817a6f581917aee9240f025fabee194c1bcd915,2016-12-28T02:59:08.840000 -CVE-2015-2733,0,0,2903f135216e5a272742fe898aaf4171a2d27f341d325211b369c8a35d916e44,2016-12-28T02:59:08.947000 -CVE-2015-2734,0,0,e71656bfc07eb058ae713fbf9257fc2005a4153b71b008584f05cb8953caa3dd,2018-10-30T16:27:37.717000 -CVE-2015-2735,0,0,e4558bd8d478a796b477495a6f6035ee0d63fdc4364102693813397cfdd4293e,2023-09-12T14:55:31.563000 -CVE-2015-2736,0,0,06a3305d94d8f23ea48cc5e8cc0fdb754ad8b96f6153b3afab2d2fd0ea1fcd42,2023-09-12T14:55:31.563000 -CVE-2015-2737,0,0,aa7af9c2b2da508d183cdf8182fec7269450fae2e6775618c16704f08bc90183,2018-10-30T16:27:37.717000 -CVE-2015-2738,0,0,0c902fc1406874a31563a0290b9bf2195b51fa5aed2e9d08aafb176d07126067,2018-10-30T16:27:37.717000 -CVE-2015-2739,0,0,45933fa797bf9d9d6ddd3f1a4038f223e9862759da6c0020f4db5fa367cd759b,2023-09-12T14:55:31.563000 -CVE-2015-2740,0,0,85e67d286d61aa90d23373fded776b119ddfede4220ad4f0ec382369cd82cfd2,2023-09-12T14:55:31.563000 -CVE-2015-2741,0,0,7e7820205e8d54ccb07d84667b9bdb732ce6809bcea5b4bc6e2c8de0f0011551,2016-12-28T02:59:09.887000 +CVE-2015-2728,0,1,27504d5e25e37a0a0d53ab9781996fa0710c00db6233a8a3f9b67be3ffe77e53,2024-10-21T13:55:03.510000 +CVE-2015-2729,0,1,050f0351ed240f59fe216d4f968ec3244baf3249b5c6521ff5d2ddb2fddab0f0,2024-10-21T13:55:03.510000 +CVE-2015-2730,0,1,5584a2e139fd25fa9e522d86e1c9d5199329fe63a07386e3985f7cabcbc6dd59,2024-10-21T13:55:03.510000 +CVE-2015-2731,0,1,2e088f3f8aebc1d52822e8d4bc11a4e009547ad513321be3ce94f38c365a9fda,2024-10-21T13:55:03.510000 +CVE-2015-2733,0,1,a4308a16b2fff662744bf8c6d4e215cb6fac061d37d1312ea57887315fc797d8,2024-10-21T13:55:03.510000 +CVE-2015-2734,0,1,959c0d3811ff1258d1d26d02c7b163902b0338a6d711ba23d81cb41265f90741,2024-10-21T13:55:03.510000 +CVE-2015-2735,0,1,20f1cd6e65d91644abd6cd4fcc81bd8e9ebf0a4d0e102c187f9494057a0a4b2d,2024-10-21T13:55:03.510000 +CVE-2015-2736,0,1,c9b383ea81785e84c6c66668fe50f59227e2b29f2cd000db868d94579ea2739b,2024-10-21T13:55:03.510000 +CVE-2015-2737,0,1,108d71186951c61cc044f24a5c50018a5e79e4e55b984dbab300ad09557484e8,2024-10-21T13:55:03.510000 +CVE-2015-2738,0,1,351bf107c0c55865d1c56b68903aeb0d127f11ce52ff74f58b0bb7397f048fcc,2024-10-21T13:55:03.510000 +CVE-2015-2739,0,1,86ad68483fe2b5ac4011154667e34a7a8535c5d640446b8209dfb327af8b3e75,2024-10-21T13:55:03.510000 +CVE-2015-2740,0,1,5f3e0a200e5997b350631390ecd0ec4d6abeebe5d406d06dc17f65985c769974,2024-10-21T13:55:03.510000 +CVE-2015-2741,0,1,e81739a4eaa3fd3bcbe1a87f995518763535cda9f5c02cea9524ff44f931c4d5,2024-10-21T13:55:03.510000 CVE-2015-2742,0,0,931e26b5fd467cb96d013d07d98a24987707bff058899576655f1d23e795a9a3,2021-09-22T14:22:12.367000 -CVE-2015-2743,0,0,900dd6940c0d6830f79f8b6ff363a50bd0a1abc2522c758addb386761dc05f16,2023-09-12T14:55:31.563000 +CVE-2015-2743,0,1,81ccfa7728a47f07814eb840fbc9b8b46560c64bb85f5e0907a1fd01b0b7764d,2024-10-21T13:55:03.510000 CVE-2015-2744,0,0,5c43e4e2d436d715782329e6abbcde223814288b78322c92dc3875ae4d55851f,2015-08-10T12:51:02.540000 CVE-2015-2745,0,0,910630cc1150cfcc8a68ec3fa6963e5449ad84a1f0b3992f11685126e62f3af0,2015-08-10T12:51:41.867000 CVE-2015-2746,0,0,fb4b5fe0437110dac9545713472c8a55b0d697c812fe4afcfdd2c99a0b238399,2018-10-09T19:56:21.157000 @@ -80392,7 +80392,7 @@ CVE-2015-7571,0,0,3f9dc790ec5b5e0ae4d173e11eeec91c0fb019aeae9a9dc83f340980d05757 CVE-2015-7572,0,0,05e926556ce160a099c8b4811046592acf17d091a458c80c59073855984617ff,2023-11-07T02:27:55.220000 CVE-2015-7573,0,0,870f82ed344d73e3d537ce18b0f6ac2fd8f1c0a7c77871cf8d863e11f0a2e692,2023-11-07T02:27:55.437000 CVE-2015-7574,0,0,383cf8946a775c84832693c260587a3fcde70a4f6f0140b4729ee0475ac991ba,2023-11-07T02:27:55.683000 -CVE-2015-7575,0,0,e5478445e9ebc3e34bc8acef78dd711c1a381989e5f43deabc31634fce916cb0,2018-10-30T16:27:35.843000 +CVE-2015-7575,0,1,60865a5d1959f48203359d7d8a4c9cf3da8eebd116b499ce6963327bee572ad6,2024-10-21T13:11:23.977000 CVE-2015-7576,0,0,cd0e485fedf437629807fc92b2d9f59ec39d263b9db8bd5d11893a8489229d74,2019-08-08T15:43:52.230000 CVE-2015-7577,0,0,a0c966c6da801590177341b67674f2dbc3b62d4aad28c33a381784ea17a39cfe,2019-08-08T15:43:52.230000 CVE-2015-7578,0,0,53cd896a197056924cbeef18e57e440a931863f1987def5036706271d94dd4f1,2019-08-08T15:16:49.297000 @@ -83522,7 +83522,7 @@ CVE-2016-10192,0,0,3ff25efd35eacefbb69de9b85afeb18dc3ca8de921441679b6154c7df4faa CVE-2016-10193,0,0,3f047a52c5ea5c2dd2b80fd9503cb978716656d594be02320a68f1eaf7ba205c,2017-03-08T17:32:47.673000 CVE-2016-10194,0,0,d5c3eab47cf91af753e603063fe5fd39d5ebadfc734c604b36693e931f30e570,2017-03-09T18:56:49.273000 CVE-2016-10195,0,0,5b4d433270117cf9ebc16709e874e332bc087772098c1a8d02e2b7e3386640b2,2022-01-31T17:39:08.007000 -CVE-2016-10196,0,0,fe43704d7b5d15a959c2d6ba34df5e9e275625ebed35b6f3ec76659a89d2feb7,2022-01-31T17:38:26.500000 +CVE-2016-10196,0,1,234aa2ce81a7bacb1267fd8b2154fd64bcab949881477d01e22cf7102a6b7468,2024-10-21T13:55:03.510000 CVE-2016-10197,0,0,83d6c5d07c92ffba6636d23c9a59cf860708c335ab83b61f6f7a1b0511f139d8,2022-01-31T17:38:48.817000 CVE-2016-10198,0,0,738474fe38cc633bb369a59ea94ac64b08e9343906c98f79c4aa205419d1bda5,2020-05-30T18:15:10.500000 CVE-2016-10199,0,0,a266999c0337f250494e075f35de7e283c84cce73a6af322b0d2827191d0f2b5,2018-01-05T02:30:32.150000 @@ -84918,12 +84918,12 @@ CVE-2016-1517,0,0,278c70300b550b431d76fc524e462a295f965e3f8b62f0e17012be257dd1a8 CVE-2016-1518,0,0,5a92d6ca4ad474fff562b1b87d91e6b14847d532486646ee8bbd91aba3d0b655,2018-10-09T19:59:10.193000 CVE-2016-1519,0,0,1aa6427b63a42e65f1a2ec1d03c9f73d9159f51ad806321ea90c8d6fbe2f1905,2018-10-09T19:59:10.473000 CVE-2016-1520,0,0,99eea1210e915f45d0a3a0818a6f932a33f5af8baee0c32c667ae149a6528d0a,2018-10-09T19:59:10.753000 -CVE-2016-1521,0,0,70f6de15e7124b566843df5d33dc6940b9db12543720465d56912b23046b72fd,2017-07-01T01:29:33.827000 -CVE-2016-1522,0,0,8151399064b9b955f286f70614c1b168fe20abb4e484475a1e5ccaacebaaa56a,2017-07-01T01:29:33.907000 -CVE-2016-1523,0,0,2df545131da09ec161e08ec5a85264f3f47e37ae825b595b1b2e8581e978210e,2017-07-01T01:29:33.967000 +CVE-2016-1521,0,1,c9781244172bb1874517e428233346d3d2795d4e3082e863ed8406d9e3b943f5,2024-10-21T13:11:23.977000 +CVE-2016-1522,0,1,ed2c8674cc84c2ec2efa013d61a5db87d6383f8bb04c3f7613f1bb228f3054b6,2024-10-21T13:11:23.977000 +CVE-2016-1523,0,1,0c8e481e18387fda906ab079933bf9cb9fcb58624fcdcc75f6f8308774348769,2024-10-21T13:11:23.977000 CVE-2016-1524,0,0,03bc6db0475ab91e6c2cda776d719d3174932118fb3fddc8d680974a95b2ff30,2018-10-09T19:59:11.037000 CVE-2016-1525,0,0,264729723a08b47604b72a490af5e80eea3150d0c6525979daa2ecd145c62e18,2018-10-09T19:59:11.457000 -CVE-2016-1526,0,0,1de9059b0b1551c0718c6431319eb527228caceac99604ce2e0468773e9f7f3c,2018-01-05T02:30:33.900000 +CVE-2016-1526,0,1,829c70c4fee849afff1c7683e29e591391e329e202ac55b5e9e1c62cab06c884,2024-10-21T13:11:23.977000 CVE-2016-1531,0,0,caec58b594b8017437d23871d380ee37ae72c8e4141b9f36641429e876132f63,2017-09-08T01:29:53.170000 CVE-2016-1541,0,0,47cb04720015af282b87134c283419f9a7dc34c10dd4032f77eb0af0be2d79c9,2018-01-05T02:30:33.963000 CVE-2016-1542,0,0,dcd708783e50e01d8cf38b16939eb796989e02cfe46b3ca02d049f32a6499201,2018-10-09T19:59:12.130000 @@ -85293,10 +85293,10 @@ CVE-2016-1926,0,0,d6746bcd169b490321adb708c8930dc152e4ebdbca5573e0784e30b60b9589 CVE-2016-1927,0,0,a199f400dfa72dfe31c6d5038b92cdfd4e6eb3ab44145c4346e4ed8cf907fb21,2016-11-28T20:02:25.890000 CVE-2016-1928,0,0,8e9a0f65c497978b11cf31c89269aa7f36e9676a9ac42e9c32cf38bc5d4d2baa,2018-12-10T19:29:15.327000 CVE-2016-1929,0,0,42b2e764df0a41b402e7523ec6ef000ca8952f15a06dd88b7c82aa1dba7bfe9e,2018-12-10T19:29:15.500000 -CVE-2016-1930,0,0,68320bcbe08dd031837c2deac2faf7dd5791465b87c06c428e45b2b7045346ee,2019-12-27T16:08:55.810000 +CVE-2016-1930,0,1,543acfce4a441e19f177d7912e3a871ca2e8051ee1301b483ded09727def1657,2024-10-21T13:11:23.977000 CVE-2016-1931,0,0,0ea47c762adbfa9dcd08b92f8e4b39d945e0701021db24dc700695687b654f98,2018-10-30T16:27:35.843000 CVE-2016-1933,0,0,5d284c52c89a0eb1d537439d24c8a946548757c74c347fe72fd8ddb811eb3859,2018-10-30T16:27:35.843000 -CVE-2016-1935,0,0,93a7e7944f239788bfbe8b4c73a49896443ce06d6fb93655526a1c56fe68e9d6,2019-12-27T16:08:55.810000 +CVE-2016-1935,0,1,0662c6bd59ab2dd2cbbde69335010513d035056f4fb7a77c4682184b8d43224e,2024-10-21T13:11:23.977000 CVE-2016-1937,0,0,45833d2a38b9239ac0d6f0514f7fcd9cf218a4407c475009fac2eba9bd7519f4,2018-10-30T16:27:35.843000 CVE-2016-1938,0,0,2444d7299d23e19c0182e69725bd45ecd6802c45cf19d7b09a4e99b5f05438c7,2018-10-30T16:27:35.843000 CVE-2016-1939,0,0,f6264a898561ebe1aaeb6845a5d9b67fc9449d31d057fd968c2daba1b8ea609b,2018-10-30T16:27:35.843000 @@ -85310,34 +85310,34 @@ CVE-2016-1946,0,0,856497e4654d86ddf2eeb3ee96d7786a37123056ab54730c37ec35d6e5df74 CVE-2016-1947,0,0,bc0e1f73bfbcd7c854944ffe15fb217f6cfa6683920586da56c27d2306698c2c,2018-10-30T16:27:35.843000 CVE-2016-1948,0,0,9cf400116908be06920ff33489627f60094a9a45fd7e6422238b02e8caa64a54,2017-09-10T01:29:13.357000 CVE-2016-1949,0,0,046706bbba0b64b513cc1739b0d20cc90fb8be4adf61e8b37721728ef6a90c07,2016-12-06T03:07:54.350000 -CVE-2016-1950,0,0,627656b9b1e6afa3390af41cbfc85f760c8714307cf21a8e4dc98c03406b4c08,2019-12-27T16:08:55.810000 +CVE-2016-1950,0,1,4d87b3b1b5f61385ca086c0981faeb1d8532d1cb92dbdd8d4d5f6c3a49694cd8,2024-10-21T13:11:23.977000 CVE-2016-1951,0,0,0b47b161578fd694b165201b58be3099b88335d378f8aa24ac654f9ff56b3743,2016-11-28T20:02:40.830000 -CVE-2016-1952,0,0,26c9ce8c243cf0ac7e61d8e69fb56a52443637808192cb8a95bef4110ed62f6d,2019-12-27T16:08:55.810000 -CVE-2016-1953,0,0,58de94f7916f11f5f50f6cd284c462c83b97e6f1b044e8cae8c1b5bbd83f2f51,2018-10-30T16:27:35.843000 -CVE-2016-1954,0,0,1dbdd0b9a00bc5a125efa1841c863b23f3750e9704ba1e09017d609c54ddd7e9,2019-12-27T16:08:55.810000 +CVE-2016-1952,0,1,24da011ef4d86a3cde0647ada1639bc3fb483f1edd7a234af72aba2c1acc242c,2024-10-21T13:11:23.977000 +CVE-2016-1953,0,1,e8eff183abefd8bc29b43301db9ead2935734ed298709ccb3d65a34c88a0388b,2024-10-21T13:11:23.977000 +CVE-2016-1954,0,1,e243d158969f54dde7e36d728baba41cbcc3fb32df3d3007b9f7bcf53bcee354,2024-10-21T13:11:23.977000 CVE-2016-1955,0,0,285355da1053d8833f6a353d989fcc624e387cfe82befc9c131b2dda8f2d7604,2018-10-30T16:27:35.843000 CVE-2016-1956,0,0,bfd0a02217183123b49b8d2f914e90e6283cf0e53bdab9a328292a0b793b5ec1,2018-10-30T16:27:35.843000 -CVE-2016-1957,0,0,62a3dbc3245b3549e8d38d594cb07b4f97b3f819cfc60b90bfe4ea077de1332c,2019-12-27T16:08:55.810000 -CVE-2016-1958,0,0,2dc190e359b527a53b228a4bd4771968072e4c5c9dd328fcad7ae7a6f959791f,2019-12-27T16:08:55.810000 +CVE-2016-1957,0,1,4ac66d8e24694b9e5979b2e5847485e1331ce75dff29abee922194952e2dfbf8,2024-10-21T13:11:23.977000 +CVE-2016-1958,0,1,676620dc8958d485eda850af8d15e1890a7fb0b4460d001b16e41c0d8dd458f9,2024-10-21T13:11:23.977000 CVE-2016-1959,0,0,9744ff9b8a026211438f7b6bc135919b89dd6e32976f91edee449a6ed3c091ff,2016-12-03T03:23:41.620000 -CVE-2016-1960,0,0,96a81a7b1ef020bff13387454c3fa40dafe372aaf770b250d872e4771eafa91b,2019-12-27T16:08:55.810000 -CVE-2016-1961,0,0,8bd041a833df607f116da4c9a3cf38afe1a436abfdad738dd9675aa897537ec1,2019-12-27T16:08:55.810000 -CVE-2016-1962,0,0,0f0318e5662c33a53431eda868e2be2bfe9d49094cb6e1bf74ed3ab84adc6bc4,2019-12-27T16:08:55.810000 +CVE-2016-1960,0,1,02eca570b99cb4dd35d12d83e725f149084bd02f3de7ffa55b3986dcd57586f8,2024-10-21T13:11:23.977000 +CVE-2016-1961,0,1,04aed93abceab73b64440a408156fab763e055113e6cdd38a827d2ac086aa6a1,2024-10-21T13:11:23.977000 +CVE-2016-1962,0,1,3894f788dd9b416e1d9275371620fa2e2a7805444128cdc8eaf7abf288dbab19,2024-10-21T13:11:23.977000 CVE-2016-1963,0,0,67b88d4bb93c4c0e6a8a3418db0fa9221d534f7c47a9517d6f5d62900a85fe5c,2016-12-03T03:23:45.887000 -CVE-2016-1964,0,0,fcc4c47dbd7fb89b931577089e5b0c2066ce3f2077bb57b4005416b28fec3c26,2019-12-27T16:08:55.810000 -CVE-2016-1965,0,0,f9510007a7c3cebbe5b49ab0863dff93611edc3de3082260f62aad96d21c8d4d,2019-12-27T16:08:55.810000 -CVE-2016-1966,0,0,54e38d760e95b0f82bfe6bc4b6926c3a22514f46728c29b073e7dee8748ea52d,2019-12-27T16:08:55.810000 +CVE-2016-1964,0,1,b92aaba335f2be4b32376326f15271cb74f9b724848f052ef4c2f26a398db293,2024-10-21T13:11:23.977000 +CVE-2016-1965,0,1,bd4eadf7300c4d66ac69cc46a0f0750455657e6c609dba0ac08935677d110b2e,2024-10-21T13:11:23.977000 +CVE-2016-1966,0,1,2774e1ed868ecf8329718f3f9b113cfd9c18b27a131a822f0a0d8f0542202432,2024-10-21T13:11:23.977000 CVE-2016-1967,0,0,7ff69dd583ebf9aec7f38f9e916252e399a084c39ace8d2a807759cbaeabde01,2016-12-03T03:23:50.247000 CVE-2016-1968,0,0,213e48325e6d7ab6c1d9d1b6fe844e2fdf160a96bb309d190578f78d15ff9f14,2016-12-03T03:23:51.293000 -CVE-2016-1969,0,0,ec58df32696b96b70db542fdfdc2a5bb71263a396ecdaf48424065dd5bad7bd2,2016-12-03T03:23:52.403000 +CVE-2016-1969,0,1,1f219388082457537c70cc91f51ead334febd7fcb37b8f405f8455d97c882f4e,2024-10-21T13:11:23.977000 CVE-2016-1970,0,0,54ee1fabd9baf81362a05bca1becbd8171b41c4694da689f00a93ef98c9754a1,2016-12-03T03:23:53.560000 CVE-2016-1971,0,0,ff8f06beee0595f7227201cc38dd65edced98d068cefcca01516153321d7bb6e,2016-12-03T03:23:54.857000 CVE-2016-1972,0,0,b23d19d5b94d9f6d3a98af0af1e2c630f584d7d60708a6f17206814a64c71a50,2016-12-03T03:23:56.030000 CVE-2016-1973,0,0,40af7f30a4d5e93e75d9b80be5939177c98de3e7522ff8573e6dcc5db76486d9,2019-12-27T16:08:55.810000 -CVE-2016-1974,0,0,77a80093720d2d2e820276619b802c1dd7cdd0727588bd3f1265b345952672ff,2019-12-27T16:08:55.810000 +CVE-2016-1974,0,1,0454986e4e9c30258c187cf19958401db382d68b232096d535ff199813890b17,2024-10-21T13:11:23.977000 CVE-2016-1975,0,0,7778eab79b0a150e4e1768680fcacbc0a67d1637a82c8cf3777231b0baa83ed8,2016-12-03T03:23:59.640000 CVE-2016-1976,0,0,3d82282077273559b31dc61cddd14dff6b201a2adb4e0c62dc353cbd2c4e9a05,2016-12-03T03:24:00.953000 -CVE-2016-1977,0,0,44a950d8a16c98aca3693d4b5b5c94fcbbc717432888358f8bd36045679dcfd1,2019-12-27T16:08:55.810000 +CVE-2016-1977,0,1,c142e7d78aa0c6bb3438a1330c74ed98caa556dd34d2a292b4674b0a87652d3b,2024-10-21T13:11:23.977000 CVE-2016-1978,0,0,f0d3894b262d2ade808b597f95449c4e40ed15275f6ca814aa3b9a2d466df0d9,2017-11-04T01:29:18.067000 CVE-2016-1979,0,0,d84bf8e6a2227b3629429bc428aca0e0cf1d2f485923efe17e3bc9633886ae2c,2017-11-04T01:29:18.130000 CVE-2016-1981,0,0,a467a6cd6879063829d3dd459fbcbb91722c14d6a22a71cb7b2d1d06150035b4,2023-02-12T23:17:20.477000 @@ -86128,55 +86128,55 @@ CVE-2016-2786,0,0,8b42227f93717db44aa6e5ffd638f72ed00b7084c5e5df75643258731ac67b CVE-2016-2787,0,0,04eb976b2b300734cf1dc817ee272d301a4fb1c1118e80ea0ded9a420996f719,2019-07-10T15:40:14.550000 CVE-2016-2788,0,0,059e16cecde0c3c60b1da7d7e7942230632c9ba58eb21f4c0793fad66d0c9da6,2022-01-24T16:46:03.193000 CVE-2016-2789,0,0,c16ee472b9c92097f9fd3d3d82b67de7081abea7a7f1aac6ace27401fdf93459,2016-12-03T03:25:48.297000 -CVE-2016-2790,0,0,e6f65258bf4760e003990838110a81e5b64f71debd0b288befaa3ba1e8b2b2b1,2019-12-27T16:08:55.810000 -CVE-2016-2791,0,0,de99dcc31a41925fb901b644e9180b98cbaa4767b944fa775f615bc881319c49,2019-12-27T16:08:55.810000 -CVE-2016-2792,0,0,c2a783112df74f0ef696a5e7c9e2ab6c1eaa9ffe4cd459adddc2bcced6abdb1e,2019-12-27T16:08:55.810000 -CVE-2016-2793,0,0,b94514f38ec904192dd2dc6621078a0fdc5d818e57c8075bc10ab295627eca0e,2019-12-27T16:08:55.810000 -CVE-2016-2794,0,0,61b2430ccbdeffa8af92c32ba634a3782f188f6d74906efcc185f56c77f1a0a9,2019-12-27T16:08:55.810000 -CVE-2016-2795,0,0,3fbe71d4144ad8de4ad710770b1756266a58fc2308cfa7aa598612d39c961d89,2019-12-27T16:08:55.810000 -CVE-2016-2796,0,0,d37dcc43d947f28432cc675deb71179ff1aa4234053d845149fe7c71fa4e509f,2019-12-27T16:08:55.810000 -CVE-2016-2797,0,0,fad45bcb50d4f51c810a7d19adda7204569350e840055ca035cea072615bd8bd,2019-12-27T16:08:55.810000 -CVE-2016-2798,0,0,89aa9ae6f97ddc83f778f2fbb49b4c969521076f5df0ac0bf67fc2c044b4fd42,2019-12-27T16:08:55.810000 -CVE-2016-2799,0,0,9925770ca76a36feaa7106a492aa2af993a34cf50179d73eb6af8150f59aa80a,2019-12-27T16:08:55.810000 -CVE-2016-2800,0,0,d84c062f856a2d1226709fe90c1f39f7b5d019b2a1fb5028bf38b6ff841c8af9,2019-12-27T16:08:55.810000 -CVE-2016-2801,0,0,ff249da556e8660d4a890ed596cbf63adc8dc5c1dffb9b833edd1166eba08f26,2019-12-27T16:08:55.810000 -CVE-2016-2802,0,0,85931b392c05589fd5d2ad07ac322e93459731c85987432d709d3b59a532f2b6,2019-12-27T16:08:55.810000 +CVE-2016-2790,0,1,f2a3473f5c294e37e88d80cbe5889081544b1144a14e49125574033916a50117,2024-10-21T13:11:23.977000 +CVE-2016-2791,0,1,7bde7209b6155c87a1a5c7d3943f60717c2f01720f2f47281fcec30d461a4bf7,2024-10-21T13:11:23.977000 +CVE-2016-2792,0,1,67f152420d4f41271c2e659049ae0fdacbef47aecc0e4c49db394fe6dea0f859,2024-10-21T13:11:23.977000 +CVE-2016-2793,0,1,e1174ca7b114e4d98752e8cf02d3d113ed5c97167e1c1ab4a1a0eb0e90927ebb,2024-10-21T13:11:23.977000 +CVE-2016-2794,0,1,3512f77ae1ab39159b97d65007695dae0c8744ea08e37f90e1edd6981ae17155,2024-10-21T13:11:23.977000 +CVE-2016-2795,0,1,1f8d9bb170a53df693253b75f5eb85dbd7c0a5665d5b1469ac0eaae90a8ecda9,2024-10-21T13:11:23.977000 +CVE-2016-2796,0,1,23c36febccad3a51faf1725a255e4880e67725fb03d3048159e386d9984504a1,2024-10-21T13:11:23.977000 +CVE-2016-2797,0,1,040ef58a9f51476baef2777221ea5833f9d20d108129179b461c4771647dab47,2024-10-21T13:11:23.977000 +CVE-2016-2798,0,1,37c4d9d710b83120a0062913fcda7473e4fa8606b4b6465bbbac474ba1c8c64b,2024-10-21T13:11:23.977000 +CVE-2016-2799,0,1,f56464f4dfc0388efdd6a196d886822592e1d054af6d172c796a1b1acdf5b7e1,2024-10-21T13:11:23.977000 +CVE-2016-2800,0,1,a4081587e897e598064521f7e8d6709bb5321b6f1a88c398874799bc9244d476,2024-10-21T13:11:23.977000 +CVE-2016-2801,0,1,46c73cb6af9934e43fc9abc38c12ad377e1621a2250129596eeb549025a6a9d5,2024-10-21T13:11:23.977000 +CVE-2016-2802,0,1,b33510c44535b253ebcc7403382f7a2e83527b03c1db1e7dbbbd21cf2c3918d8,2024-10-21T13:11:23.977000 CVE-2016-2803,0,0,3a2251602063cd5825e0da687097cbc9eb056e5b17ed2a8dab419c3a19ce36cd,2018-10-09T19:59:41.757000 -CVE-2016-2804,0,0,6f9ea072d45b38f096a6b506f752ef3f5639b0f2f2537f0487fe10519c935b29,2017-07-01T01:29:40.233000 -CVE-2016-2805,0,0,d3b1fdfbfb20220642c1784832669f4231f2fa3e4b6f2e28e9116a93dcc6be7c,2017-07-01T01:29:40.297000 +CVE-2016-2804,0,1,9579c79977a57a161b02fefec71c80d1c489ccd4d6255979515faac06d7afcd1,2024-10-21T13:11:23.977000 +CVE-2016-2805,0,1,0deac520d357798d6c4a13ecc09983ea53f75320f9d2d40a75a53274a2cc58a0,2024-10-21T13:11:23.977000 CVE-2016-2806,0,0,5f94f11ff8d726385e6502df975f0abfdf067d84de700843a4bd5c5d59c2f666,2018-10-30T16:27:35.843000 -CVE-2016-2807,0,0,1cfb9e84d02db806ef01015389bb0ead7db2a409400e7e6ebc934f2bbb167c52,2018-10-30T16:27:35.843000 -CVE-2016-2808,0,0,771563b41e175621fa7d2d555daf6b8a8a144c9d2fe78fd48db3109ad837161b,2017-07-01T01:29:40.517000 +CVE-2016-2807,0,1,02f32083d29b76ce719e6a7e16faf37e9c98e70499dbdcec26fce6e080cc38e2,2024-10-21T13:11:23.977000 +CVE-2016-2808,0,1,5a0372062dcbbae3a7095cf16e04b78eba617e47689b36f27d5f700d0ba55eab,2024-10-21T13:11:23.977000 CVE-2016-2809,0,0,2145865d3fb286c012e0d6e3fef9b7297648b7d89198625ed1075a214620fbd6,2017-07-01T01:29:40.577000 CVE-2016-2810,0,0,ebb09d838ebd25423ce9fee2cf97a18af59d4c09372099ed9cd0561f581f0de4,2017-07-01T01:29:40.627000 CVE-2016-2811,0,0,66ae3985ab0f19c55ac11c0b489d970a2a92789f51bbf75f0751f2d5f21d9e33,2017-07-01T01:29:40.670000 CVE-2016-2812,0,0,285d999fbc93bb948045b9726c389dcaffb1f6045d4cfb2f4c2f91a3c6410c0c,2017-07-01T01:29:40.733000 CVE-2016-2813,0,0,8bb609c02652b8158ee7d20fda9bced26e0c672f7a84a0a7a89fb22f8bcbdc0c,2017-07-01T01:29:40.780000 -CVE-2016-2814,0,0,f9799446ec2e2773861bc45c174600659cadac61271c4ed5afd8bc20cb9f639c,2017-07-01T01:29:40.827000 +CVE-2016-2814,0,1,2be0218eb8a64f082515f3d2ea2d4126afc86a45c565237e184362ad30314d96,2024-10-21T13:11:23.977000 CVE-2016-2815,0,0,31455578b3af606469be4ce16ebc7fc12c313fe0b74a01f74802711f5a9b8e8d,2023-09-12T14:55:31.563000 CVE-2016-2816,0,0,4f3e3ce0541baede77bd1ccb7c8c14177781c422d23a0348006473d65c140da3,2017-07-01T01:29:40.890000 CVE-2016-2817,0,0,d09740e19aba42aba7733186722ffa3865a69a7c8de4ffd53ef0ce085c275dc7,2017-07-01T01:29:40.937000 -CVE-2016-2818,0,0,fba972671308e37fa03b109de0158a552d99e0a07e9ccad3e761484ba153082f,2023-09-12T14:55:31.563000 -CVE-2016-2819,0,0,1a46f45d0c87b866f763c2de56f46d289dcdb2beedbf10eb2a705724ce2c7a47,2018-10-30T16:27:35.843000 +CVE-2016-2818,0,1,b743165e377518473e76589aa47dc79c2ae412a05d53e15f3b217ed88545bff4,2024-10-21T13:11:23.977000 +CVE-2016-2819,0,1,e65b4d81e617f25dcc757cfb1a43f069a2a0a372e3578364171837c899a192a1,2024-10-21T13:11:23.977000 CVE-2016-2820,0,0,89db4a4297484fa9501741a766079554ccc6bc1f849c33d11cc8bd858ef68e54,2017-07-01T01:29:40.983000 -CVE-2016-2821,0,0,2519cadd04d48b004663518cbc3ffcff8bbdc4ae67c0a828a65eb7f481a2b385,2018-10-30T16:27:35.843000 -CVE-2016-2822,0,0,8afccae72d4f63c43a465bc290f2d5727b496151ea38cfb05bee6c6442adbec4,2018-10-30T16:27:35.843000 -CVE-2016-2824,0,0,6a9a5ad77e3d1505460912b737cd93575d82f8fb9547e352543df493598150a9,2018-10-30T16:27:35.843000 +CVE-2016-2821,0,1,0f2d29aa68d824c57eaf3c7ec52c1c6aecd2bb34185be53c0773b57328b85d75,2024-10-21T13:11:23.977000 +CVE-2016-2822,0,1,67c90f2c53da8a133baee85d40726c5670daea7e2db1a8697d90f4009b3bcba3,2024-10-21T13:11:23.977000 +CVE-2016-2824,0,1,0ed5dafcad99478a5419ee065b4c069ef12550bc7a98b5805ff7a552148d334b,2024-10-21T13:11:23.977000 CVE-2016-2825,0,0,7384282efafc2152d15edc9264c9404bd97119533c858f1b730bea4ef3476343,2018-10-30T16:27:35.843000 -CVE-2016-2826,0,0,2d58573a296cce956c28c290bb9650ec0824d29def019018c4cc619a64dce47c,2016-11-28T20:04:56.587000 +CVE-2016-2826,0,1,647d3fe66fc52f0b55d184b14ab9295932825321eb3f282889ae29cdaf9f91b8,2024-10-21T13:11:23.977000 CVE-2016-2827,0,0,5539b56306ec3b36035c3abbec4b1e6415189ddac9a84742d4c9f38b396dc0bb,2018-06-12T01:29:00.440000 -CVE-2016-2828,0,0,7854b96faf4deae715b9846e10ccc0ca6c5f3a9006ac100ed2fec32358e21022,2018-10-30T16:27:35.843000 +CVE-2016-2828,0,1,85af9c8f052a113eaf12d75c779d8bbaa65a2a97af50035d1dc5b1f53e8bef6c,2024-10-21T13:11:23.977000 CVE-2016-2829,0,0,75fcae6c54d2b590c18b822bb9d00b6aff29be569917ababb99eb8cb1dd6f9fd,2018-10-30T16:27:35.843000 -CVE-2016-2830,0,0,4387f18f676d57b45ea86e20d4dc8fed5af1c8261c8dc027fe5c78adff69179a,2017-08-16T01:29:06.337000 -CVE-2016-2831,0,0,1537e21de96e74a8c105b670d91d7b933bf6f0d4720bce6b2f837cc19c5b6a71,2018-10-30T16:27:35.843000 +CVE-2016-2830,0,1,1fa9763357d102c6f22a1b5024c843cc718b6cbe8e018f439cc8cc95f0eea7a4,2024-10-21T13:11:23.977000 +CVE-2016-2831,0,1,1a181335d2c70115573cc04d96d5506314ac1aa4d374db6e0efc90c568d2145b,2024-10-21T13:11:23.977000 CVE-2016-2832,0,0,fc7eeec85fb8391f01c8bee9119f3c43d3dbe8279233203a6a285375d64bb222,2018-10-30T16:27:35.843000 CVE-2016-2833,0,0,5790a24041b9ceef522a0c7deadc560b38973c5094e97862dc6812eba852c9cb,2018-10-30T16:27:35.843000 CVE-2016-2834,0,0,40c1f5da1114388d3a26f347249905cd9227feb153a2f3e2ae420285241a1dcb,2023-09-12T14:55:31.563000 CVE-2016-2835,0,0,b5c576eb55f16c4d496ccb0bf13fc5df61d5a3954d20429f652aa0bae1928bb9,2017-08-16T01:29:06.413000 -CVE-2016-2836,0,0,bc947899d824db5b6f2840fb78d4948dc3edaf04df55b07f36eda7cb3221c9b5,2017-08-16T01:29:06.477000 -CVE-2016-2837,0,0,3f9030433d88d3b0ad1e6c9d8d64e2eea09760f6c48f14b19116a0e57055b31f,2019-12-27T16:08:55.810000 -CVE-2016-2838,0,0,5949cea2b0af47994b28dee6b48b3646b59763c8aae4f3e08940c796889d631c,2017-08-16T01:29:06.633000 -CVE-2016-2839,0,0,c515f280a287ee07e76e6d43d4d37725731e1d34d1a6232deb6eafd6dab7aa85,2017-08-16T01:29:06.697000 +CVE-2016-2836,0,1,aa4aa012833afb0f79072209c1ac9b8b51aa11d2639438a0eab2725ff06cbaef,2024-10-21T13:11:23.977000 +CVE-2016-2837,0,1,9321d90e98ba3f96800bf2a1fe095c3b50484f8c707795c7ba20a8e7611a05ba,2024-10-21T13:11:23.977000 +CVE-2016-2838,0,1,5c7aae995f3e5a47a1baff2736a7471d202c984f60a3f76fec2ed7715dd80bb7,2024-10-21T13:11:23.977000 +CVE-2016-2839,0,1,9368618bdb1d3c500b926be90a0588e01d4ef1843495e0c8c145a86e3d2bb99e,2024-10-21T13:11:23.977000 CVE-2016-2840,0,0,1031ba990b5d06b5b9391e1be1461cbc769ea650e7c3929d2d3da867e4cdcf60,2018-10-19T15:46:29.913000 CVE-2016-2841,0,0,1ac7f02855b443101c32cbfd56920da7626d57d890c7459efda564f018ff21ca,2023-02-12T23:17:46.330000 CVE-2016-2842,0,0,bbcd995ae99960a33026e3a12d634bd8fcfed221c3019e28b37ca6ff6ed6f3c5,2023-11-07T02:32:04.163000 @@ -88447,38 +88447,38 @@ CVE-2016-5248,0,0,3b459d28bd5b1f6a6b0d9b3c88d4870f9a33128326b1f47d24a56cc39575c9 CVE-2016-5249,0,0,9c9e2837ea46fd7163c0f4783e8e5f2eb9e5cde7342b32461e53d9f87a975be4,2016-07-01T18:45:19.533000 CVE-2016-5250,0,0,44cd00727e1e2ff37fbe332521cff0d94b120265dcdc2e21b3cdb192674c555b,2018-06-12T01:29:00.533000 CVE-2016-5251,0,0,5e5fc8d43d56e4b9bbd8d11ab326dfe8fdfb5944412f4050a1ded8ac37fbea9d,2017-08-16T01:29:08.807000 -CVE-2016-5252,0,0,9a51db7677b212b3004fc39ed0ac2b96dec4bd5a946e34c2c99bf92baa1d59e4,2019-12-27T16:08:55.810000 +CVE-2016-5252,0,1,62a42bd60dea310faaab59fbe7c7878c4ee3eb58147753cef32ca6a0611dc11f,2024-10-21T13:11:23.977000 CVE-2016-5253,0,0,9409aa1611950130339324e21d9aecb6fc0964c0f9ac74a459da60332304de27,2017-08-16T01:29:08.913000 -CVE-2016-5254,0,0,6f9cb03da2438d13f25039c574ac62cc0c5d4b06b5bf4d22d40d50fd7c9980c6,2019-12-27T16:08:55.810000 +CVE-2016-5254,0,1,b689bc1d1c37e22ee25bf74935ed80e676e5065f5b73144373365790d0d7cf6d,2024-10-21T13:11:23.977000 CVE-2016-5255,0,0,9792bb4699ef69125fc0ef5758848c82a8ab372ef756c32f532ac3d089ac32b4,2017-08-16T01:29:09.040000 CVE-2016-5256,0,0,284fb0bc7ae9f73cda30b500bf568272a5a07934adc0bac25efe4fa3939f7deb,2017-07-30T01:29:07.960000 -CVE-2016-5257,0,0,47c8f1e77fa1d7045c25b8bbd88dd95ea47eccc4fead45c248f5614434c8de6d,2018-06-12T01:29:00.597000 -CVE-2016-5258,0,0,ef1e76a4dc7074e9d07118b0c68862b2ebddc0a776de65ba6cce6c190594d899,2019-12-27T16:08:55.810000 -CVE-2016-5259,0,0,83ba8bf4434f47f82ca3f2c0917baccae3988b2074bcaae08812b55db67e6192,2019-12-27T16:08:55.810000 +CVE-2016-5257,0,1,b2cfa5dff058f8f1e19780dabc2a3d095e8b0f4fb21445e13f2d7dec11037ad8,2024-10-21T13:11:23.977000 +CVE-2016-5258,0,1,42d0425937fc7758b63a0ffcf7b3cf34e65731a220ddd6df4b04ae169c73a9ba,2024-10-21T13:11:23.977000 +CVE-2016-5259,0,1,6e2a7ba4183e46ea465c74fe42db2439670b1d5062cb161954f0cedb7ed444ad,2024-10-21T13:11:23.977000 CVE-2016-5260,0,0,efea80fce330f14782949505551454b1775b26c07026b53c976f2a5d6bea80b6,2017-08-16T01:29:09.210000 CVE-2016-5261,0,0,640ff5e981907c1b965454b39789261b2678f8ed9ce56c58c660dbb043609ad1,2018-06-12T01:29:00.673000 -CVE-2016-5262,0,0,e1c52b17b8fe3681790cde10893b6479e8d57df40ac9e1abf071890e201e80af,2019-12-27T16:08:55.810000 -CVE-2016-5263,0,0,ebc6bfa6d8101fc6336f0c14e1cf614080b8a366fb28a05da684b66a4b2008d0,2019-12-27T16:08:55.810000 -CVE-2016-5264,0,0,374fb29c222dbaa5651d9c4f40d9e1397c7e1be5fe1dec1ff2b126813ca3c9fa,2019-12-27T16:08:55.810000 -CVE-2016-5265,0,0,9d0af10d8dbe45eaaad426a3c55df715b5a72f8db2a9b5b140c06f809db7033a,2019-12-27T16:08:55.810000 +CVE-2016-5262,0,1,d53a6a10e844ff9e7fec9cee638f08c32391b02b6451f3815ca44cd279227a75,2024-10-21T13:11:23.977000 +CVE-2016-5263,0,1,1aa1e1a3de935166f2c50fbabfaf502871478696d9d6f8931ba0ce4c9d35de1c,2024-10-21T13:11:23.977000 +CVE-2016-5264,0,1,af02b904b17f8c70ba6c4d1d2d23d3791e28b1ffd726ff55b263ae84b623d5be,2024-10-21T13:11:23.977000 +CVE-2016-5265,0,1,e2d9fb6d386deeeedb12f2b3f20f2562c24780c238bad04188a0c6b897f998fe,2024-10-21T13:11:23.977000 CVE-2016-5266,0,0,a3589148a4d5b12b22a9615f1546dee58ea0f29d1e00ce7a6077249ade2896c5,2017-08-16T01:29:09.603000 CVE-2016-5267,0,0,106b91a1d779d2ab85b2048cd476e2266719dfb21ffcb296c2d4d4457589775c,2017-08-16T01:29:09.663000 CVE-2016-5268,0,0,1fb10ed3f2048cbe8d862201cd085c60af9561ca8d76c333543b206cdb182ed4,2017-08-16T01:29:09.710000 -CVE-2016-5270,0,0,af66735b9ee4ec241b6c9934b7ebd5cf2040bf78dadc67ad729c98799b053718,2018-06-12T01:29:00.737000 +CVE-2016-5270,0,1,ce01831f517582ec4d48c1e7582a4d65ce65a53a4a6959cbcc10db30ce9e4f8e,2024-10-21T13:11:23.977000 CVE-2016-5271,0,0,cf6dee4f4e50db2a5b1dd5d8edd873d0c73f37d33d0318801360ad6b0fe4f745,2017-07-30T01:29:08.117000 -CVE-2016-5272,0,0,5f5bacead548df6ec1b221635ddae06777fb3de7781b80ac67eb44aaf0e547e0,2018-06-12T01:29:00.830000 +CVE-2016-5272,0,1,1805f3ad5d941cbf51dcf2fefc881a441d1df46fa18592eb07880c808af1d8b6,2024-10-21T13:11:23.977000 CVE-2016-5273,0,0,f140b089b1c9f14edeeec5ade5507c3656d9a70dc8fec3fe9d6ea54dbeb5524c,2017-07-30T01:29:08.227000 -CVE-2016-5274,0,0,b3758ed5fdfc601eadd741c11fb35504bcfad1f1060f9850c07992bdcf42688d,2018-06-12T01:29:00.893000 +CVE-2016-5274,0,1,35f6de1898e99b0a70f5a90a3240237edaacdf9b3ff3f4aff919e02ece686563,2024-10-21T13:11:23.977000 CVE-2016-5275,0,0,3de0801481d17adf5b2670ac7aaa821c23d254faa66d78ae71334c3c4544b0e4,2017-07-30T01:29:08.320000 -CVE-2016-5276,0,0,291b5069eb3fcb7a2737fdc0727f2ade2a09045dda2e66d07d2e3ef274d53416,2018-06-12T01:29:00.987000 -CVE-2016-5277,0,0,f02aaea55bf8cfe273f22369a46b1082c10befbdbf416a25742c557ea4df4caf,2018-06-12T01:29:01.067000 -CVE-2016-5278,0,0,1028a0df34cbbe5828c93d14ac1f4f9e3e2fc11432a5fe32264482dc95026682,2018-06-12T01:29:01.160000 +CVE-2016-5276,0,1,637e5a99a66152412f7cf744cdf8f1f07f0077c49463ccc795f94930b00f02c2,2024-10-21T13:11:23.977000 +CVE-2016-5277,0,1,1c00a14c9aa61670e0519e3c72d44bcfd9b1ccca3b40b8890ee979749f4975ce,2024-10-21T13:11:23.977000 +CVE-2016-5278,0,1,3edd5a45f88e51b68297ee2990bfdc0d332c39a11c853bfe4c8319e9e2aa83d1,2024-10-21T13:11:23.977000 CVE-2016-5279,0,0,394e3339a3f6c91f0926ff9ee5c916088c5e64c9a49cf46c8917b72a91a76439,2017-07-30T01:29:08.507000 -CVE-2016-5280,0,0,f41f9f4b23eb4ae02c1a1c94d8b780e34c23231a9ca70866afdc0cfafb90bdd7,2018-10-30T16:27:02.717000 -CVE-2016-5281,0,0,b0812828bc961a651ca51718ffa2f3ade0d9ff2809e79425531d09de08b519be,2018-10-30T16:27:02.717000 +CVE-2016-5280,0,1,5c5757e72f0b8d61103e2dcfc74a11995c068b7cd4b1851b0985f784924ef99a,2024-10-21T13:55:03.510000 +CVE-2016-5281,0,1,438f91b16ca6a930fca501fe4584a498ba8c6cc45ee2f19323563c71956012c4,2024-10-21T13:55:03.510000 CVE-2016-5282,0,0,bf025c5650ff948984d0568fcf91a22c31d6bd178a07bc0d05d086d858dc67e4,2017-07-30T01:29:08.647000 CVE-2016-5283,0,0,172cbc676b612d12594f126caca0186521849c15ca126ae92b92d1e6a26bd693,2017-07-30T01:29:08.693000 -CVE-2016-5284,0,0,42443f58a5bdeb2a72f3cb421eb01eb77c2bd66b59e91eb8f698415791e2bbe7,2018-10-30T16:27:02.717000 +CVE-2016-5284,0,1,a4aa4cc8fb128e608e1cdd3f69623c22fbd76ed7f2584b1c4d7e5f39c2aaf910,2024-10-21T13:55:03.510000 CVE-2016-5285,0,0,95a905ee7edd473ced35b6d9f297746b2c907bddcb71eeef3889870b75f4b9bd,2020-01-09T20:15:10.723000 CVE-2016-5287,0,0,e49e8e5a2f0f84dda095d1d071ad94548b1def88e7eda62fc1e9d933dbc2a7a1,2018-07-30T18:29:05.390000 CVE-2016-5288,0,0,e1d464c90739d9222efbb9b24c8003870617465f662ce875e55213a88a401f78,2018-07-30T18:28:44.783000 @@ -92683,7 +92683,7 @@ CVE-2016-9895,0,0,bb7a258ee8e229210a06ac384e8d0416c57eb40b09f045a6fbd7d3e12a2854 CVE-2016-9896,0,0,50bee295d4ea28e25a19b56b24af9c91302d7fddfc4d3502e19a13667b622b07,2019-06-25T19:38:25.563000 CVE-2016-9897,0,0,ba188bc0da3f44c64ead647fb2dc0131a7d7edfb15e640f9f4b5adfc691cb6dd,2018-08-01T13:46:35.907000 CVE-2016-9898,0,0,6b4d25ac5afa8d1420c46b069adb4eebc53fb058b5247a45b9638f27efb25c82,2018-08-03T17:24:02.770000 -CVE-2016-9899,0,0,95a222945252c5734ba442a2fe78a20dcf9e7a154ffd7383e2a1445a86f905c5,2018-08-03T17:55:54.840000 +CVE-2016-9899,0,1,8d7158c06229c490c48ba5b01624de38316cc0d2798cfafbd49d4f1a19d19299,2024-10-21T13:55:03.510000 CVE-2016-9900,0,0,9968472981d9a51c8e6a2a6026b91deea4dfed9c7e34b176d8d76e737dee3b1d,2018-08-03T17:56:15.183000 CVE-2016-9901,0,0,9e2264b8070465d5ee3ae2f147c715636bafdb1d70bfc0627f43860189b20ff5,2018-08-01T13:43:06.643000 CVE-2016-9902,0,0,13cbfaa168e8ac851dc67724e531de80852c2f5375abb2a484d13564238066cd,2018-08-09T16:39:38.850000 @@ -105695,25 +105695,25 @@ CVE-2017-5425,0,0,2de7edecabaaf8e7d2ec838d433cd4fd231bf162e4e0a8502f3e243fec7691 CVE-2017-5426,0,0,fc91fe773a5a8c6add7d52f0b81f379f7422a4231ee22f7a6e7c3b6fe97f52d6,2019-10-03T00:03:26.223000 CVE-2017-5427,0,0,879aa806075356b9c8572cb24e2b360cade59a2592910c07d194c0aba61860c2,2018-08-07T18:06:07.003000 CVE-2017-5428,0,0,2dce22a4f991b4a5d8d22ac3e9e3eb0ca3ffcf543cd8c7d4400eb3fa404883ea,2018-08-09T15:27:03.350000 -CVE-2017-5429,0,0,682c21dc83dc826216c25f01b76e589df2fe7d797bb220ca8d5b6ba3bb570bd8,2018-08-07T17:53:32.560000 +CVE-2017-5429,0,1,35a8b832fa5277508f3c561f5671740310d87b121126b4deaba83fa05d2322ba,2024-10-21T13:55:03.510000 CVE-2017-5430,0,0,d4aaa0f5bfdfe137002312f057e5a44be9fe2943b2265f0795091704bdab8158,2018-08-09T15:28:49.150000 -CVE-2017-5432,0,0,79b1263fc5c3bed2aa295c1b43c7ce333874761919227401b399fef7fc51b780,2018-08-07T17:56:26.117000 -CVE-2017-5433,0,0,f8b7c37063719c9c6ac53d5c4ef636a014686889a0bee44870280be73b8c576c,2018-08-07T17:58:20.610000 -CVE-2017-5434,0,0,c3c143af2ae9e1c69abf5f6f6f4bd6f6c804a30f1352b061e8bf009e04a2d490,2018-08-07T18:00:07.397000 -CVE-2017-5435,0,0,2483628e174ecc1c67e80372fa9383591303b37eedc85e27ef9fdc2a700d8ca1,2018-08-07T18:01:00.983000 -CVE-2017-5436,0,0,ce47d7ac8a5f995cb6ba5830d1eb72b1e6db87e6e8ac5135fdb472bfd030b9e4,2018-08-07T18:01:45.533000 +CVE-2017-5432,0,1,e8d57e1f18dccbce5cb40967c0cf85a0a26af924e5d70e2e0aee862e9abd09d4,2024-10-21T13:55:03.510000 +CVE-2017-5433,0,1,f7250cbc79db9bac1d46fa452c40f417cff6e5dca49c04f7623b1b90d752a66d,2024-10-21T13:55:03.510000 +CVE-2017-5434,0,1,bb3af6e52eea49e76e3e427d41f2915a96d6902714e4ecc4e6b0e5cf1d536dbc,2024-10-21T13:55:03.510000 +CVE-2017-5435,0,1,a2fcfe16db3cb29ee594ca10e8260674c554b6ca27f04ac7784dfc65d1740a7f,2024-10-21T13:55:03.510000 +CVE-2017-5436,0,1,56419919ead8cc5669e19486c59e93ba5cb1fb9cf2a9ed450c829bbf26ff4169,2024-10-21T13:55:03.510000 CVE-2017-5437,0,0,3f4de189295342b203f15f458a329d8d9f2725fa8004205cfeb7cd755d860163,2023-11-07T02:49:25.073000 -CVE-2017-5438,0,0,91adfe9fe0c8748936b3763adc8cabdc328a3f246660b34780f749f6f0a59678,2018-08-07T18:02:27.037000 -CVE-2017-5439,0,0,bfa8201a6fee242fa7fe0651fcdaeeb458f56478d60b960f4b45b62bf99ef1bf,2018-08-07T18:03:36.307000 -CVE-2017-5440,0,0,1068b5488bd6a20ac8c1ac7921c75d9841542121012edd86c2a135512206f21f,2018-08-07T18:04:54.093000 -CVE-2017-5441,0,0,618f3461beb32887dfb27bf7f645ea6496f3887536fbf70f7be44c58b141be3a,2018-08-07T18:05:30.093000 -CVE-2017-5442,0,0,29f19e92d4ed1080c5ae0eddc60e5e94322788cdd6f58d8f001e94f5eca6861b,2018-08-07T18:16:12.297000 -CVE-2017-5443,0,0,dfb21f303ed886db5b9bc234ffc31c72f094ed8741afc35b154643e2ced18afa,2018-08-07T18:17:08.973000 -CVE-2017-5444,0,0,d7a472e88102bb4a7aab8a0c1bc0c9eae21db82acac94f6c4680b220670e2dc5,2018-08-07T18:17:54.697000 -CVE-2017-5445,0,0,e0c69bd65f632af40bb6b1de8f7f0885c7a15fb1680405c3bde4c64ad931087f,2018-08-07T18:18:29.713000 -CVE-2017-5446,0,0,9bd9b639dd9ec21712c53471128e7c258ade5a0991edf882dfc108fc5f0ba838,2018-08-07T18:19:07.747000 -CVE-2017-5447,0,0,792b1948a466f9ad3fa5acb429b8e6e8e2d23946347cbe0f58d07ac3506ed54e,2018-08-07T18:19:47.687000 -CVE-2017-5448,0,0,0a9345a491a889f1017b5f727500d6cbd652a1be85b01e9fddbe0ab26d465d82,2018-08-09T15:30:33.573000 +CVE-2017-5438,0,1,5964a4c6533289b36bdcde68e7da625d49b5f706d4a888fe1e995daad59c14f9,2024-10-21T13:55:03.510000 +CVE-2017-5439,0,1,a65bd5c37fdf5b95dbe566cace42a73232e3a9419e16d7f915f7290632e3f9d7,2024-10-21T13:55:03.510000 +CVE-2017-5440,0,1,2834851dacfa421b39b1d470ddaad75eb099240172467c482e4b94ff96c75d55,2024-10-21T13:55:03.510000 +CVE-2017-5441,0,1,ca57830f963f75764376b358f3061ed4fbf0c808905aea4d51a235147b9099e4,2024-10-21T13:55:03.510000 +CVE-2017-5442,0,1,a815f0eea3d3c660f55861cd405b5cf5796fc6eec94a0621a719f8014592ee8d,2024-10-21T13:55:03.510000 +CVE-2017-5443,0,1,9b6bbf888b83edb45b2d448a6740ed797eef08a04c898f37469dcae63403d407,2024-10-21T13:55:03.510000 +CVE-2017-5444,0,1,2436927a61be8e372965cbe7ca1a2e15dd3762f4c33b7e19994fc38a27853f2c,2024-10-21T13:55:03.510000 +CVE-2017-5445,0,1,faf405c88f3e6bb422527f355ad5e55a0ac3fd894c3dd6278acc97dc2eb27f76,2024-10-21T13:55:03.510000 +CVE-2017-5446,0,1,5f7a3a74acee6e145c096bf20538860ac3661a487b4e5921204fc6f0e0b9e419,2024-10-21T13:55:03.510000 +CVE-2017-5447,0,1,8a091733886b837e972249797d853e84aa6de557108f62e0bc3bb52a6c7699b7,2024-10-21T13:55:03.510000 +CVE-2017-5448,0,1,9a077162683c0749596f85a705d89ec2022c93a162a84db176703ce0528d8bdf,2024-10-21T13:55:03.510000 CVE-2017-5449,0,0,32d851242b873d90ac562a696bb346ab101c9b7c1b6de633d5f81599f126aefc,2018-08-09T15:33:47.200000 CVE-2017-5450,0,0,4707923ee25f898295204cae97a45441758e8e60198d3bcb8da58eaa686541f7,2018-07-30T14:54:42.083000 CVE-2017-5451,0,0,f146fc8310ea1b6806e0fcd8a2b99db0c04d21e92de548bfa892da51301b4440,2018-08-09T15:34:11.577000 @@ -105723,17 +105723,17 @@ CVE-2017-5454,0,0,1c9afc3d21103d5b4ee0e306031d6f04c3b622c7860549ff30efe7f3d52236 CVE-2017-5455,0,0,903a6094818a4836b3e7d8d0b846556bb1c4cc70dc4ae1e97a8a2d22ba04a87c,2019-10-03T00:03:26.223000 CVE-2017-5456,0,0,b8a3e82d774f3a69f546cd2caa8807d852f7f4ceff931d614628774f09456c3b,2019-10-03T00:03:26.223000 CVE-2017-5458,0,0,77fd2a40d0a3c1f20688f899cef2a04cd968ecd57acfaca694e3477b45cb4b0b,2018-08-07T12:20:05.330000 -CVE-2017-5459,0,0,d30753124c0f8143fe2507269d97adc1f379c80caecbbaccf842111e4fe57158,2018-08-07T18:20:28.440000 -CVE-2017-5460,0,0,eed5b49d0e9a042b7f942f8a7a5da1ee165d1ed6a1c900e0d5b6552ab9c02826,2018-08-07T18:21:31.210000 +CVE-2017-5459,0,1,ab07a724cc24991bbba6cb1c7dc4a693aacbfa1547e712de8bf5112bc8d35142,2024-10-21T13:55:03.510000 +CVE-2017-5460,0,1,b3bdd13684ddb4a263d406889d948d0f8e4a82f2e72d473d87ca70e10b5a09a2,2024-10-21T13:55:03.510000 CVE-2017-5461,0,0,45eb80ffaae161af10b746786a0d1986a94394a9f587b74868d07edcfe66c485,2021-07-20T23:15:12.377000 -CVE-2017-5462,0,0,027574efe7ec50250b96fd2047204605d2d6d7f3a318ed5e6a415abb021d45c6,2019-10-03T00:03:26.223000 +CVE-2017-5462,0,1,72b26eb0ce1760c9ee3bb9ccba1ffd1ec89bf1e6c6e8d71c6bbf27785ad7cf9a,2024-10-21T13:55:03.510000 CVE-2017-5463,0,0,1dbbf83e0a3cbff9b921b547fe04c98fa951dbd9c6b1152b18134341c35bcc10,2018-08-09T18:11:57.797000 -CVE-2017-5464,0,0,0710cfc19ae210f45e08d5b5ab6fc54bd224b9a5646a29addd693094b90479fc,2018-08-07T18:43:59.927000 -CVE-2017-5465,0,0,bd5010379c1eb93ec60e9d796c2560de73fd491eaef776ff786f6719779bfd92,2018-08-07T18:44:19.567000 +CVE-2017-5464,0,1,669bc3805c7f4831aba40889bac7beab0d039e63950ca289bbf0f83cc04641c4,2024-10-21T13:55:03.510000 +CVE-2017-5465,0,1,884d50dd4e418a72d7613d31466df935c0be3652a2901842ac99e2b88bca843c,2024-10-21T13:55:03.510000 CVE-2017-5466,0,0,ec1a2cb450732c6a9b8572722807b622f01377d895b281661a06bbd3e903f3f8,2018-08-09T15:51:55.530000 CVE-2017-5467,0,0,beb380f1a8af82c29b4e9276b7c60d6614de4e5fc8ea1f7ddd7bf7e7ad8cd2a1,2018-07-30T15:00:50.660000 CVE-2017-5468,0,0,c56896fed2febecc5e5348ba01575a53157025c1147a3a33e3578258e91f7d4a,2019-10-03T00:03:26.223000 -CVE-2017-5469,0,0,d8386b904e4661a95ff77ed5b5815d919b4504a85d59e46915c00b6a66cb446f,2018-08-07T18:44:47.397000 +CVE-2017-5469,0,1,0d3fd264edf0cd597da4d8b4db9bc3c4d5d0a17b69ea29baf854e8b410421e6b,2024-10-21T13:55:03.510000 CVE-2017-5470,0,0,eec095cce22ee03e6f758d942d23bf9298e35a097b7d769761c70fdeff504224,2018-08-03T14:16:14.187000 CVE-2017-5471,0,0,ab98f9d2f8182c5de6c2373003410c467ecd55177cde8fa26947da9737bbdf81,2018-08-09T14:37:50.277000 CVE-2017-5472,0,0,ea6e51b0bf4e10d3842c3263ec0fc61e7aab3b6e7ee4fa71a91a6208f2467b6d,2018-08-03T14:24:10.050000 @@ -107749,7 +107749,7 @@ CVE-2017-7782,0,0,49be19c00a757732e653b2d4912180a4b94390c0aa50012e365df0d07d01ef CVE-2017-7783,0,0,adf350bc941c6741e1ef62e0ce394251a3f8448c6166ca9654a4fc77501ec55b,2018-07-30T15:24:02.027000 CVE-2017-7784,0,0,201f5f2c15c70e9ba397d4d0afb21bdc10f6a0f532d865956c98a362bcbcbc1e,2018-08-03T15:07:17.447000 CVE-2017-7785,0,0,ad4bc4adf9b488fa3025569c52259cbe1ece9984d9a3c0bf435a7d18ed9d798b,2018-08-03T15:09:08.717000 -CVE-2017-7786,0,0,5ea393f5ce8087908318337d97f3db59c7a2b02ca32bc303f654d5d4912e22ac,2018-08-03T15:09:48.170000 +CVE-2017-7786,0,1,6695bee9251cb398e8d4819d7e3c3c10259a788f8f8876ca3dfe8a7a0eca8b49,2024-10-21T13:55:03.510000 CVE-2017-7787,0,0,1677f60438b0b3dfbea81ee641905e4e0ad1d82fc76d543437272251e44f962f,2018-08-03T15:10:10.340000 CVE-2017-7788,0,0,abf246c932690643116205458952ad6aad7b4b8f7f03bd66962e0b833b378256,2018-08-09T18:11:49.407000 CVE-2017-7789,0,0,b4d1de82a501d062bb76a8872948f347e6ed4ed51f3e1d5b08c7dd58f9a58ff1,2019-10-03T00:03:26.223000 @@ -107767,7 +107767,7 @@ CVE-2017-7801,0,0,921cfe8deeca0991bdcf27e40c8fb5699726c0066d058c75b329fee677aaf2 CVE-2017-7802,0,0,6fda9c0d4cdb4ef6bb73d7579e376272032574790c19be976678ac61e3c93588,2018-08-03T15:14:53.180000 CVE-2017-7803,0,0,d5e13a40db2ba6eda8296348d2a92d9c24e3534665d85e9de4478df3339994f4,2019-10-03T00:03:26.223000 CVE-2017-7804,0,0,caf462eb6e31ffaca25bf8f4c4bbae22e5e17c16f17ea90229a8b431d1433eff,2018-08-06T16:27:10.237000 -CVE-2017-7805,0,0,82ad9cbd2987103d70fdee7ae3c7f8da9213ec550de322fdcd7a797c5f73e50a,2018-10-17T01:30:58.527000 +CVE-2017-7805,0,1,76cbfa3b2b0b61cad9f7fa18e440b9b76ed7a933898333640c531a9f19c41158,2024-10-21T13:11:23.977000 CVE-2017-7806,0,0,90899af2826a9193ba2e2fc02a8ebe7f5e631e746ec77ff0e672f927ff27fd0a,2018-07-30T15:27:43.697000 CVE-2017-7807,0,0,9fffbeae0fbb7e6d676ef0a5012c429ad250780d9b9e292cb600ebb4c0c7f094,2019-10-03T00:03:26.223000 CVE-2017-7808,0,0,d0aa84ee5ade08d1ba4085a5afb67fbdbb3ccd4ff045af0ab01fb4b80374953d,2018-08-09T13:42:23.393000 @@ -113335,15 +113335,15 @@ CVE-2018-12357,0,0,4dbfdc5e0803ba2cea44880f76b86f59363f8325bf55bacff1ce4dd1d350d CVE-2018-12358,0,0,80ddb1d1b63d62187b6ac1f6665d1ca1a3b4539e7aea58d66da32a1b83a9a19a,2018-12-06T14:37:33.370000 CVE-2018-12359,0,0,064f7784275bff6b386b8c75e7700a611d7edd395301fda53a0d98a29348cee3,2018-12-06T14:50:52.517000 CVE-2018-1236,0,0,04de9817873cd6656030efe7e5b8550f2cfbde68432f101e882fc86cd323284c,2023-11-07T02:55:53.747000 -CVE-2018-12360,0,0,1139c6d6de43a2048ad9daaf68cc3f585f29fa78e3ced96f8fc25cd8a97b4ec2,2018-12-03T20:08:09.937000 +CVE-2018-12360,0,1,cae30583042b4f401708c56ca1c45b4ead0a3a3b7030bc3f9b8d550d1d72987a,2024-10-21T13:55:03.510000 CVE-2018-12361,0,0,5fad9f36faf40d9a686cb89575d80ccec2622049ee6793ae101b3c710217e2f0,2018-12-06T14:38:54.327000 -CVE-2018-12362,0,0,076aa24f096d28bb153663724ae63cf42518bfa49bd50b0f4290f950f47d507c,2018-12-03T20:11:26.143000 -CVE-2018-12363,0,0,c828e4bcb3fde29ac7c32abbf7aa81ce4c15a9b29c5393f4db9795c8832fff84,2018-12-03T20:10:26.643000 -CVE-2018-12364,0,0,e66ba97900bf6977e92d0f6bed0096b7b16479351e3066f6750d8b0dd9665bf6,2018-12-03T20:10:14.970000 -CVE-2018-12365,0,0,fa074e80b9cc36bc9335ee01f0c1e3a566780a672518a0e4c8230252e27ccc70,2018-12-03T20:09:20.063000 -CVE-2018-12366,0,0,061aed7cee0927c506e33cb1fb25dae7946a707c15cd7d67a00e2b5c5115cfd8,2018-12-03T20:09:54.203000 +CVE-2018-12362,0,1,8f1146d5d473cede743204e6131037bcf9453e62a3601ac9a50c3bec412e1b3e,2024-10-21T13:55:03.510000 +CVE-2018-12363,0,1,09dac2c10273b6d04bb5d85c4307e6f864bd796737bc8738ed8e383e494032f0,2024-10-21T13:55:03.510000 +CVE-2018-12364,0,1,586b1020e093206ed3feb17d0500ebed05423ddd24dd059911c79684b9acb531,2024-10-21T13:55:03.510000 +CVE-2018-12365,0,1,60808b65233a9b13fc8d11f47926e9559855cc90a93ac18f4ead5e74c6db32ec,2024-10-21T13:55:03.510000 +CVE-2018-12366,0,1,25b93dac8fe89082bab1c98217e30449ab08c1e65697f354251a3c6f50387408,2024-10-21T13:55:03.510000 CVE-2018-12367,0,0,a0676562260226d06e924702a43081a2d53ffb3965a53f34f7e88caed2aa46f1,2018-12-06T15:10:55.787000 -CVE-2018-12368,0,0,c7534a699138bd178da5113d3dbf91e757d85633d488cb619a78a595f3151546,2019-10-03T00:03:26.223000 +CVE-2018-12368,0,1,7520b9473da0592720e00303e9484098c5d1ef545aa2d230b21f237b3fa3ad0c,2024-10-21T13:55:03.510000 CVE-2018-12369,0,0,25c3b6a36ff741fdb742fb8e0ccb7ca21d6f53bc621b1735cb7f972ac5b01956,2019-10-03T00:03:26.223000 CVE-2018-1237,0,0,fa3d99c4866f53fab0163590a0aa5f2115cab74c54c341d8bdd89f5aad97db6f,2018-04-24T12:22:17.777000 CVE-2018-12370,0,0,8a1c2697cfdcd835d5ba4098d104864c910cd554fd176e4ba93a9e9e4080958d,2018-12-06T15:29:36.790000 @@ -123657,7 +123657,7 @@ CVE-2018-5152,0,0,7b58e72aa197ef9c7c03bcbf57c8353d71e62e92bcdbd48117e9829c2514ac CVE-2018-5153,0,0,8592425269b9829b32448e2a7701b20c4c6cde7a38e49fc48f6d7cb9ba6af4fa,2018-08-14T16:32:47.233000 CVE-2018-5154,0,0,a6a8739d3b3834b7a1189a42e5bbf07817eedb708b627fd0d02e43af765025da,2019-03-11T16:51:13.427000 CVE-2018-5155,0,0,1f1fcb2bfd7e19cde0f32a84371727d5c32a57e3dc4bf6554691dee931238888,2019-03-11T16:44:21.010000 -CVE-2018-5156,0,0,2184eef24f5cdc23460bf033b2457bc062180637f846b5385daff0f9b73e4451,2018-12-06T18:39:17.293000 +CVE-2018-5156,0,1,cc6c1941ee1bc6bf674ce08f30d7b0443c7a1e90b7198d89e1e2ece1706fe17c,2024-10-21T13:55:03.510000 CVE-2018-5157,0,0,1d59bd35a806ee7dead3dd4586060fecdd0bea3d358a1a873ab4a8e76bdcabe7,2019-03-13T13:44:13.607000 CVE-2018-5158,0,0,54e646da050605cbf9f2a21e1d4c9ea5034aa4667b7c36f0539446ba1e6107a3,2019-03-13T13:44:01.683000 CVE-2018-5159,0,0,a03eb2ce927c984c9fc0092585e7b5312be1c0462e47e10406a49f92b877b956,2019-03-11T16:06:03.727000 @@ -123688,7 +123688,7 @@ CVE-2018-5184,0,0,4ca3fc7eb8b7d220d2bac84bcf5c5798f6339129be167f137e23a79462f285 CVE-2018-5185,0,0,4fffde32e9b416a5b6947fef44875c6c266f56bd2735d01a1155ab346a434f0b,2019-10-03T00:03:26.223000 CVE-2018-5186,0,0,f72d7294797388663d4afe0f059903589fa0dc3d333d23b9a7a76ce8de6d41c0,2018-12-06T18:13:30.173000 CVE-2018-5187,0,0,788451538f7721562e7fd27f9c5a62f6122c34e3b431c7af6993d0e491edbb24,2018-12-06T18:44:00.110000 -CVE-2018-5188,0,0,87f8805b06ef50dcc11395624c600721be34295507124583a730ac29e9e185e7,2018-12-06T18:44:37.707000 +CVE-2018-5188,0,1,f72fd81368d05284c385301f8c1939048c243defa6dcc414a796fb411ae782f9,2024-10-21T13:55:03.510000 CVE-2018-5189,0,0,90ab1ad7f3ec62a4b981553f04869085784f6d6fe34f2a6737f5ec8211401672,2018-10-17T17:12:21.393000 CVE-2018-5190,0,0,bc8039f362057aa0e6bd82b5af54e05e676da23cbb22aa789d48b5f5bf129114,2019-10-03T00:03:26.223000 CVE-2018-5191,0,0,8ac9f8a1a582f9a4da1a013ad8cc2033675075933e695e03aa5c9692d4e8734d,2023-11-07T02:58:40.173000 @@ -129927,7 +129927,7 @@ CVE-2019-11740,0,0,ef0b4980d9c00a40c27738888cf208cf961eb6f80db043fed11500dd46cf1 CVE-2019-11741,0,0,876c952a4354b8f0b8d91fdccf2c9d6e8ae31815bf1a2e92b32746bb0b0d0437,2019-10-02T17:31:48.873000 CVE-2019-11742,0,0,65392544e7a3a13fd65aac804027bfc16e4e5cf1346d9b75272a18c7a9d4aac9,2019-10-04T18:15:13.753000 CVE-2019-11743,0,0,105d04d49397a5c953a46171e4f200cbe3adc2c3d87929d8a17b755f4b6b96d8,2020-08-24T17:37:01.140000 -CVE-2019-11744,0,0,fa1aed82dd146cdfb8dcca24b1d2f00a5db4b4b023a4d126f0927f049fd741bb,2019-10-04T18:15:14.003000 +CVE-2019-11744,0,1,4559c83c7050665dcd8a03de2ca119c837a6cf1abbbdf5b183bc059b08b4acc2,2024-10-21T13:55:03.510000 CVE-2019-11745,0,0,1030c2a9131dee8da46410d168ae592f82ee507144de6d741d649712e8dfbdd0,2021-02-19T17:22:17.650000 CVE-2019-11746,0,0,daaabfd02c1ba8356bc71c5c56f477fe590517b3ddd5c9ba3db746aa4ce1ca1c,2019-10-04T18:15:14.110000 CVE-2019-11747,0,0,b399cb49a1119a9233c2b6592c4d2193efe0677cb9f9e6d1dd7f17c68453f1fb,2019-10-05T06:15:14.083000 @@ -141923,7 +141923,7 @@ CVE-2019-7313,0,0,08dac901c3ab94ebf275a60613fef654588c82d572ce3b1e66754972b03042 CVE-2019-7314,0,0,cd367b7b5bd7ff016d0db08d9cd07172fd4d84404f48172bf274e374aedd08cb,2020-07-07T06:15:11.337000 CVE-2019-7315,0,0,655babeca8c8699ebe56def6d52ff3c4b5fbcee0d182a155d3e1a91e48b210a5,2019-06-20T14:00:14.677000 CVE-2019-7316,0,0,22e4f7dc81144e2f39b945be48c90c90554c014ce135857c8859d70d0fe2a95f,2020-10-07T08:15:11.913000 -CVE-2019-7317,0,0,e3ac777710ff4108a7e59a3307fb05f90498d96734fa188ef7979b224d8a565d,2022-05-23T15:02:40.667000 +CVE-2019-7317,0,1,74965c30b29b6ec515e564f39079ceb4c4131f911f5d1e5cb73ecf89e062cb4b,2024-10-21T13:55:03.510000 CVE-2019-7319,0,0,ff03b6e890c756d023fcb6ea16e98e9b0a55bbdac32849e3402df42d3c97907c,2020-08-24T17:37:01.140000 CVE-2019-7321,0,0,bfaa3641e9fe6e34f5a5b1caa73b0a594bc910bf5ba707e0a8b9ead1962e194d,2024-09-11T16:15:03.643000 CVE-2019-7323,0,0,d44784f70f4d24610b0d52acad664b5c526cfbb90381285299d127aa60c8eb76,2020-08-24T17:37:01.140000 @@ -143967,7 +143967,7 @@ CVE-2019-9808,0,0,58b461df77264a74884d8fed5974f9fc86428521600a68fcfd2262a26b7f1d CVE-2019-9809,0,0,9253dbd7a0cd7c9d424f4018d5aa7b05f216fe3f53d92c7f5fef952947ba7e2f,2019-04-29T19:04:24.533000 CVE-2019-9810,0,0,a3c64d2a937a3cd538c9a507c30f6869b1a3a39705bd0359b72cc4cdc24a28e9,2022-03-30T17:57:02.607000 CVE-2019-9811,0,0,3e5d412bcb5209e66f274d88e0570b1c3846ea9f75637d8095418af1ef756403,2023-02-28T14:40:59.713000 -CVE-2019-9812,0,0,6dbf70a9688c1b1b6d549855803b0f54609944379fca1b5d49710256f09139cf,2021-07-21T11:39:23.747000 +CVE-2019-9812,0,1,28e6c50b7cda6d8c18be08fcd48fcf9a5ff9bd8ab77b42f3d759222aa4694592,2024-10-21T13:55:03.510000 CVE-2019-9813,0,0,3dc7b4403d4e27e46764a658743a1587abe7b171335feb08d2beec53419b9033,2020-08-24T17:37:01.140000 CVE-2019-9814,0,0,901769a9e8d4e9f8c58232cdb130eeb4036a92ae2c691ee4b12918f7e46a5361,2021-07-21T11:39:23.747000 CVE-2019-9815,0,0,0180f8bfb6d5233184ef7939b7d29776ed577e9d09ea5eecda8f747d58f836d2,2021-09-08T17:22:01.943000 @@ -150392,7 +150392,7 @@ CVE-2020-15649,0,0,b7a90b69fa520d2a41874cecd3ffbf6ed800c8d073bb07b833ffadbd84569 CVE-2020-1565,0,0,05ce0cf0c979bc94381daa751ec17480c703f90deb435a6788689cd21883bdfc,2024-01-19T00:15:18.637000 CVE-2020-15650,0,0,ba636a033ffb73145d835fd1c920d423f7f42563188276f92693a49460754ac9,2020-08-12T16:41:44.980000 CVE-2020-15651,0,0,72e6866fbf8fc7d0941040b94f28ea6b1133208cac67bcf19a8316ea6bd0960b,2021-07-21T11:39:23.747000 -CVE-2020-15652,0,0,cc8cb827a9062f3ab5e37f8e6dfe56b7da47d6d3585834d28a26da0a51c77530,2022-12-06T21:30:39.517000 +CVE-2020-15652,0,1,8a8ca3afbde27f22c54a24e6a02a30ce68b6476f5b35646cc1ce7d9b10c765ab,2024-10-21T13:55:03.510000 CVE-2020-15653,0,0,9d135f2b408998a19c8cf23072bc8da3ad48b3b5bdc2f6fc4f3e871473100fbc,2023-02-02T22:19:14.043000 CVE-2020-15654,0,0,e7e952f75e225a9beb07aada9807537beb6c4facaa8787ef87cb31f8364c2625,2023-02-02T22:19:18.087000 CVE-2020-15655,0,0,ca5cde16f42845485de65486873b11e33d52d2426fde8b2026f80a342991c2f8,2022-05-03T13:00:43.593000 @@ -150404,8 +150404,8 @@ CVE-2020-1566,0,0,b3eed77cd93008af01e01297fb929d19d9e4f86c808dcfbe057b6b2c049744 CVE-2020-15660,0,0,7f405a5007d6f2e4397d662c6065b21e8ddbf42d4f819047f3b613b8ba3cd744,2022-02-22T14:28:32.633000 CVE-2020-15661,0,0,445173288c3c2271256bdfa95acdbdb8f7d096120034956fa4853327e5ea2e2f,2020-08-14T15:00:25.850000 CVE-2020-15662,0,0,87b15c3e5500afc587d1de6588a6a3d0fe4b4c46bf6a14b0580526f06468fd53,2020-08-14T15:10:33.213000 -CVE-2020-15663,0,0,d25eb191ac428a36c848f60b805f2984d4cbddbd8e69b53c3e0f1c1c248b5df5,2022-07-12T17:42:04.277000 -CVE-2020-15664,0,0,fa961427c41b0c16a0e7cdb9f6b2dfcf035c89abebf625554353cb0717dc25ba,2020-10-13T14:08:16.160000 +CVE-2020-15663,0,1,01d31f9de0b935843598d28e90cb6d02f02369bae50be8c188b0e7f85e75710d,2024-10-21T13:55:03.510000 +CVE-2020-15664,0,1,c20c9c262c72d31f47a63a0d51fb703f1bd6e42d3f79c3f0be20dcd00a880c22,2024-10-21T13:55:03.510000 CVE-2020-15665,0,0,b103ac820851628c5a806647fec2f1cd1620da7e997651027aac77233041cbaa,2020-10-13T17:00:11.627000 CVE-2020-15666,0,0,5f04e8bd138e25d4d7b241e4cba2b32f356e1ee1cc1a95a53c97a87a91ddf621,2021-07-21T11:39:23.747000 CVE-2020-15667,0,0,d44009eebf6a53555c4932bc0f44cd75f2b2f6bf9decbbd59e472407ae8f24c8,2021-07-21T11:39:23.747000 @@ -180680,16 +180680,16 @@ CVE-2021-38488,0,0,fe8a186b5390afc725435c1b35fdee17372f7b7212455ee417c0344b755ba CVE-2021-3849,0,0,6eb50c7c3acec120f5cc06074d86844c005332db2815af61b018a07e73d4de8a,2022-10-27T11:55:52.653000 CVE-2021-38490,0,0,18e2987243bad2424a0908d9ef2225d2d707ec6bbeb37746c10a5786537d7088,2021-08-18T19:20:37.190000 CVE-2021-38491,0,0,c2a304e170f66adc2ce1de59058c06efc777d317512de88ebe8e575fd08e90f3,2022-03-16T17:04:01.070000 -CVE-2021-38492,0,0,7179c0a662364433484e413ce81725a7302ae90cfde67660442e1ec28d813deb,2022-12-09T19:19:12.667000 +CVE-2021-38492,0,1,c5ecc5010fe2664998fdd80278bdda7bf24d3975401ae4783b958f30be5f9ad3,2024-10-21T13:55:03.510000 CVE-2021-38493,0,0,72e8481b6ac415e72bc774435832293a7ddb382136c5d319e8406b96a56ccfdc,2022-12-09T19:26:40.013000 CVE-2021-38494,0,0,9652f03c1f53314b6de08e791628ef8ad336fa5fd8956f967b8dd53e05e2589e,2022-05-03T16:04:40.443000 CVE-2021-38495,0,0,f7c67d44aa44ad71e9b2056c4f1cac7605ce3c823fce96175bb2d6d30e3f8c41,2022-12-09T19:27:49.010000 -CVE-2021-38496,0,0,37400c64d9ad64ff31de708117d74b4b72d9e664335be75897430a1430a968e5,2022-03-17T19:20:47.287000 +CVE-2021-38496,0,1,766a02a866ff3a716378142c4d8bd52fa2727d2470eaa610df9a7a49a3bd8ab2,2024-10-21T13:55:03.510000 CVE-2021-38497,0,0,b60c10c34762234b9d1151d6aa19e9db8349b7a85a1018ac29dc5b2b0fa18e72,2021-11-04T20:31:19.487000 CVE-2021-38498,0,0,c87292f377204e5801bc87094deb13860caa8896e1d201e4288a20df271ba483,2021-11-04T20:29:31.557000 CVE-2021-38499,0,0,019c52ffab6936956729c8dd79092626ef1caed2f943bf7e5046c19aeceffc0d,2022-05-03T16:04:40.443000 CVE-2021-3850,0,0,0d5f18832ace37ded75a7326193fb867bf63489d65c7e1cbcb10b1218eee24c1,2022-10-27T11:45:56.437000 -CVE-2021-38500,0,0,7fab15f22c5d02f823241b0106c0a213f2626ebe0d0586000597e455dc3b0b50,2022-03-17T19:36:32.060000 +CVE-2021-38500,0,1,f3b982e38080403b6ef14c07f90603c5ded1bd6bdc72f2b327b5ed901d6533a7,2024-10-21T13:55:03.510000 CVE-2021-38501,0,0,c904a4ef40e206644138608ae974798595929f730b5fe0bb99ca85b25c5e27a7,2021-11-04T19:29:58.350000 CVE-2021-38502,0,0,ab15647100026378a6e94df740533953de3aedcae8051d156790f77a8439a336,2022-07-12T17:42:04.277000 CVE-2021-38503,0,0,752002ae0f207b3d554a23ec76f9b1ab8328569ab2393927504afd0cc246e47f,2022-12-09T15:21:48.227000 @@ -183606,7 +183606,7 @@ CVE-2021-42138,0,0,0c929dcb03fb853af8daa162d3c304b985918eafb54d55b312f38b498fb04 CVE-2021-42139,0,0,a96a6b4fca97c2a9441e097385312c6235b251b4d65c41e79d57bd1d2294c32f,2021-11-04T12:47:41.027000 CVE-2021-4214,0,0,54ac605b0fa20d3d2f28225d3b771fd125e84d4f6658a1381b1202806480480d,2022-11-08T02:32:10.533000 CVE-2021-42141,0,0,43c1e3b6eb81a5789bf1702be06ec03c88992ebf5384eb0b396e56be78b69679,2024-01-30T14:30:05.467000 -CVE-2021-42142,0,1,0b7bfc570c99a7fe9f2cbd5e617241e427ff84b76d1e1e43e5b326a52e5dd91e,2024-10-21T11:35:00.650000 +CVE-2021-42142,0,0,0b7bfc570c99a7fe9f2cbd5e617241e427ff84b76d1e1e43e5b326a52e5dd91e,2024-10-21T11:35:00.650000 CVE-2021-42143,0,0,aa5a5e3c604816a0446b831d1c8a7752c4f18b86851adf2c43eb6ff4f09f1efd,2024-01-31T20:05:29.880000 CVE-2021-42144,0,0,7443f6d25c568f2909fc7e2278afa53d2a0832f2dfedf7bba13b3aa052ffef00,2024-01-31T20:27:20.740000 CVE-2021-42145,0,0,08e7180328be2be6b83cad8f90a9b4bfeb50b49613d1bd966073eda920211569,2024-01-31T18:56:08.913000 @@ -185147,7 +185147,7 @@ CVE-2021-44331,0,0,ef8cce1887e168c78fae6edf24b9726de04eac36963c603fa8cded33689e9 CVE-2021-44334,0,0,88518b06dfb66f133d0d556c40dbd50ef480c31f60ff802505d060136f314097,2022-03-08T18:23:04.330000 CVE-2021-44335,0,0,cdf18333d2681dffb25ebbc672ba74e81930a7ef7706fe89e6e6f312f17c0106,2022-03-14T17:32:02.493000 CVE-2021-44339,0,0,a6fae98f03a8a1c39a7ab068573117afeffaca48d29d4af029269daf4fec7273,2022-03-08T18:23:49.003000 -CVE-2021-4434,0,0,d75c716a79bad3973146e8eb9e7ff4e0aeb339f964e48114fcd47bf9e0656582,2024-01-24T16:02:27.587000 +CVE-2021-4434,0,1,47bdfa456e19c5ecce560498446021170b333c05079ab52103fcf2e80c054ea5,2024-10-21T12:35:00.840000 CVE-2021-44340,0,0,a952dec2e80077a424acb373f7407c6c9087692cbd5f720ea148d3be5a1b21c9,2022-03-08T18:01:04.817000 CVE-2021-44342,0,0,7c39d5bdde55a440b35e93456a1c425f3e9360cb4c6ac593730c94ae413bc9d3,2022-03-08T18:23:33.597000 CVE-2021-44343,0,0,4b464c2ca34b0ee598fc41db1142cdd35887d58ae6e1bf1ff3f16cc5e6753349,2022-03-14T17:35:05.120000 @@ -204916,13 +204916,13 @@ CVE-2022-38468,0,0,9154435340b15792a7a37b20bb9beca7a73d7b5c07f881952cb301911a8d5 CVE-2022-38469,0,0,baa2c89154ac141b2e1a679f4fa5aff7859ad3ead5d760e19cade2790d9aabb9,2023-11-07T03:50:09.243000 CVE-2022-3847,0,0,33d42c84e07f3f414e943f528450410e2982efa1749613329eda7115fe23116e,2023-11-07T03:51:52.860000 CVE-2022-38470,0,0,3428b9c69e8667cec95500a71d370bdc7b13837bc62ea7f38bae8e117efb0ece,2022-09-26T15:27:16.920000 -CVE-2022-38472,0,0,38c60c803ba74f7a12bc4f93146b4b4a143c765b9ef3499f09c2d90d60c2801f,2023-01-03T21:13:48.670000 -CVE-2022-38473,0,0,b0e7ff2a1964464e95d7452459c8001da048debea8adc9eb9b2e3f0eae817216,2023-01-03T21:12:27.323000 +CVE-2022-38472,0,1,5aa4fe4e8b6be8a0be093db7def71474298b2dcea9f9c4f8f2b5c7b6e05521a2,2024-10-21T13:55:03.510000 +CVE-2022-38473,0,1,b2472b4a3a2122bebde379225eb9365387998c76885f80c0e45a60dac11ba365,2024-10-21T13:55:03.510000 CVE-2022-38474,0,0,6294cc5fd787f9880c7ef00d05099d47ca9703847c44579e61614501ed526686,2023-01-03T21:11:01.473000 CVE-2022-38475,0,0,65a1af9c9eb1eb249e14b7fb683848ac48a2c8f3dc9e40c164fd2cc75558750c,2023-01-03T20:57:02.993000 CVE-2022-38476,0,0,dbf1dd4b617a6a10a5e55fa3f4856666aace5fab2503be0df8155703e036964d,2023-01-03T20:51:36.807000 CVE-2022-38477,0,0,d9dfcdbf2ee597efe846de93b03f3148e49cd0f6be8a9f50edcf5253c62c0f70,2023-01-03T20:43:54.027000 -CVE-2022-38478,0,0,80acf085ce6eee7273ed409626946100749b50d7a84c5077ca7a5a126093cce8,2022-12-31T02:35:22.677000 +CVE-2022-38478,0,1,3875df5eebdc8374c94ff42aded9995b426e4b0232763c5f27438e767f4545ee,2024-10-21T13:55:03.510000 CVE-2022-3848,0,0,8d05f2bad0d18abba7087b3f3ab6db2e85445ea31862334ae23ffe111bab5b89,2023-11-07T03:51:52.960000 CVE-2022-38481,0,0,ecc8086ac6a266d3791166598e1bacccd8af326252e24122f56c00dbcb45b369,2023-01-14T04:32:58.650000 CVE-2022-38482,0,0,4963f86cf1de166c0b349d52929a7858d66575ce4d998f3c2aa7573ae449fc96,2023-01-14T04:32:47.217000 @@ -221794,7 +221794,7 @@ CVE-2023-28732,0,0,e196b8dbc6967c7f12698d7619cf4155131ac089bc2d432d3336d2eb1ec6b CVE-2023-28733,0,0,95386e16eee24c233e3706df5cdc1989978d63184efc9cdca52ab15856de6329,2023-11-07T04:10:50.413000 CVE-2023-28736,0,0,3dfac2cec2bd68c9d347da721ed6c03398cfebb94e645e28892a6bff9c8a3362,2023-11-07T04:10:50.490000 CVE-2023-28737,0,0,ca402bc6661396538c1cfe96f35db333252de7479d7abba116072e4cffd635a2,2024-08-14T21:35:02.740000 -CVE-2023-28738,0,0,b0a59cee6d5bc2263b638e0e772a2880e25e28df19fb9d0ca37618191cf7bddd,2024-01-30T15:18:46.843000 +CVE-2023-28738,0,1,fedebeb836f7ef5e229719a392abd0c649d16ebf5ea07d268d25ed0037121b47,2024-10-21T12:35:02.883000 CVE-2023-28739,0,0,7fcdb6a999937afdc0423d66609c096e5e73b61eefc48b5f521707fe9c41e0d5,2024-02-14T15:01:55.963000 CVE-2023-2874,0,0,1ed8e252fe534e558925feefc456a054c98abc3eea771e9cc97f799a382a0be1,2024-05-17T02:23:20.113000 CVE-2023-28740,0,0,79eaf758825cfcfd170f31f1c5060939076cc7de226667402f0a29e05b36bf31,2023-11-30T15:11:43.503000 @@ -226147,7 +226147,7 @@ CVE-2023-34344,0,0,594e7f883b8bb4929eb984560738f5b28b056961b94da6428a06f1149c817 CVE-2023-34345,0,0,8a9ad7476ee901d4399a3de4a06c34730fe891534f451c6ac4124d784659450f,2023-06-20T14:03:07.980000 CVE-2023-34346,0,0,cc790449c927a6e96a622a7ad3da53a23145f0d710d1b741ea823bcdb4a1d79f,2023-10-12T22:27:26.273000 CVE-2023-34347,0,0,8dba9048a555fbfda92c38bd5370d190d46918b5d6ea0e82a68814bbeb37dcf1,2023-11-07T04:15:34.137000 -CVE-2023-34348,0,0,23913545737e61a00c6cbcd6fb20b97091726f27ec25ea2ffa014154c5041890,2024-01-26T14:58:57.713000 +CVE-2023-34348,0,1,c3721c995208e3f2fba199a7a9f2dc4688470ecb2a3fb2aa5b403b1f7f5cca25,2024-10-21T12:35:03.677000 CVE-2023-34349,0,0,5a2000cb88a1bdf2b9e1bb2db28bc583608d6ef725619d6974b5080e5a41d1cf,2023-11-07T04:15:34.220000 CVE-2023-3435,0,0,acaf2567930e21a39b5931b68fe58590cbe4d49b5ff713b0021a83d0dd7de88b,2023-11-07T04:18:43.933000 CVE-2023-34350,0,0,998ba2d7b58ed4c07ef935523c6896f04bd8cb3865e83439bda7c2269fc50724,2023-11-21T19:57:25.250000 @@ -230669,7 +230669,7 @@ CVE-2023-40446,0,0,8b9a0fd6e5e167cdc12afda812614c846650c66be74645c257321ba890664 CVE-2023-40447,0,0,ba8a4588c5be24be94940418440cd7e1a7f9ce1a9cf1573462fff78623750e4f,2023-12-07T20:15:37.680000 CVE-2023-40448,0,0,23da6ec20146bd3914f77a7eb5aeffa03207be4a0f4c6afd09f5029201d17dd3,2023-11-07T04:20:14.757000 CVE-2023-40449,0,0,3c0e9b8344d0d7cb0a51347962d0f9d1ade8c23957cccada2d3c6b2f24752671,2023-11-02T14:58:19.950000 -CVE-2023-4045,0,0,d02309562557e4c141af062d9503ad6a93e5545c33ef4fdd400d281286d51635,2023-08-09T21:15:11.137000 +CVE-2023-4045,0,1,4c0900a53ddfaf65e7f2937ac29a6aa03828603d51293ce4be4a264b451c43ca,2024-10-21T13:55:03.510000 CVE-2023-40450,0,0,d0d2fe2c6b77e1b2d928d2f49e58cbf3458bbc4f130f706689cabf8b5c61637d,2023-10-12T02:28:48.060000 CVE-2023-40451,0,0,53d52bb36c7903dce04fb0f4b9d72e63a58a839302277d2ef2af4250f9c72b5b,2024-01-31T15:15:09.977000 CVE-2023-40452,0,0,abfd30a5fdb80950f171cfbe800d51816fc83d170b610aa52771f6852a1f724d,2023-11-07T04:20:14.897000 @@ -230679,7 +230679,7 @@ CVE-2023-40455,0,0,058abdb8c2eae30e165ec5b264dbf295ba8e09c6c3830c69886965016a5de CVE-2023-40456,0,0,7169803686183a5f1d426b39f88228ec6dce3691ab53bc177c949c7a8fd9efca,2023-11-07T04:20:15.193000 CVE-2023-40458,0,0,79a445a17e1f85e1f6c9345cf6a43d9301aed3a647416fbf1fc2770253362cdc,2023-12-05T01:55:09.410000 CVE-2023-40459,0,0,72958d07cda00b0c6d4ae1b61eff24e072a6de9dcd7e9245179ab8da7c7dd63d,2023-12-08T15:47:51.637000 -CVE-2023-4046,0,0,4358b07da1a51bc454b79a749d7e747ef2469824fc8762e745772cd3bbe676ba,2023-08-09T21:15:11.253000 +CVE-2023-4046,0,1,0036787c72efcbbf190a268a3fbfef0336b3a473e19902adf91ebc1c91038d40,2024-10-21T13:55:03.510000 CVE-2023-40460,0,0,cb8d4a4b518509c4362ccb8f0afbc3d4ba81059d0c319d00ce1a78f314f5df45,2023-12-08T15:47:41.403000 CVE-2023-40461,0,0,2ca71e2d74941f7db08d3ae15972c35f65a7a1c0b913d4173afa994ddac5a43a,2023-12-08T15:47:23.163000 CVE-2023-40462,0,0,ffd7cbc54880373ae62e24016d5dd35693f5e2718a1f76f9f7406aa53c66dcee,2024-02-02T03:12:25.617000 @@ -230688,7 +230688,7 @@ CVE-2023-40464,0,0,8231b0c451d5b4c35d027e1b67bba80c7df83e1e1ad17ab04a2494355e768 CVE-2023-40465,0,0,c70021b90b2721ff443a40c1111bf31fef348ab6ba2a7cf6bbcd8bc7822299fa,2023-12-08T15:44:51.933000 CVE-2023-40468,0,0,7d84164a8bc2564940a981b796397726ff721c6aa0efdcb2152db15cd7184661,2024-05-03T12:50:12.213000 CVE-2023-40469,0,0,0ed69cdce8225d95cfae6682abc1ebaf65719f0b970e047791ac57fa9c47f189,2024-05-03T12:50:12.213000 -CVE-2023-4047,0,0,63a240cbca2de8bff602cc4719867e8b1d8ebb3b488a1609433c678aced0d20c,2023-08-09T21:15:11.370000 +CVE-2023-4047,0,1,a8b0ef0cb1ca3e80ffe58bacc717bac063e45b45e58fb94c1763c293653e02bc,2024-10-21T13:55:03.510000 CVE-2023-40470,0,0,afada78b6007b2ba33bbf78e11be4d28f3cd22e160c8e61f962a7cebd7f52155,2024-05-03T12:50:12.213000 CVE-2023-40471,0,0,becbb43c9e1a564fe69963a88bb1087ad0f2669a388b9f3e94466c56f3f010c0,2024-05-03T12:50:12.213000 CVE-2023-40472,0,0,63bad795c4e37646c5a06e5ac3ca24cbaa679ad10a3550f3f51a2397791e5a38,2024-05-03T12:50:12.213000 @@ -230699,7 +230699,7 @@ CVE-2023-40476,0,0,990cdb29579a0a42e2b0b90e1ff61c936b2215b9b38d595acb2c3b495a94d CVE-2023-40477,0,0,bf7bd805408bb9938532327c097b39611135aa4263d48f1c31bff5599ca5f6ac,2024-05-03T12:50:12.213000 CVE-2023-40478,0,0,3813fa4ea718093279009f433811c990f4f34dc459cf82b9e9ca779ceeaac098,2024-05-03T12:50:12.213000 CVE-2023-40479,0,0,1a7d396842ef92259b6deb8297ef0b077b3ee7a9e535f945f97aa32494822be5,2024-05-03T12:50:12.213000 -CVE-2023-4048,0,0,510e838563e798a5e99a4bdd31c96141dc2bb55abc10a9726506e680ff0d261c,2023-08-11T20:03:47.233000 +CVE-2023-4048,0,1,30d1d085d265a8b6feafce692048725dc43d14d1ee9b4e6d8a31ee82c7a297c5,2024-10-21T13:55:03.510000 CVE-2023-40480,0,0,07de3baa211ab35f535d27f20039971bedfb9cbd3fe7579f3e4e6b21d0dc9c86,2024-05-03T12:50:12.213000 CVE-2023-40481,0,0,3150de1a4b1356cd76c239ffd3c3ce8db9996021a524f873c625498ad746e97f,2024-05-03T12:50:12.213000 CVE-2023-40482,0,0,8f94395e9ba4410d50fe2038a3c2e8560042bfdc2934680d88774c764f0115a8,2024-05-03T12:50:12.213000 @@ -230710,7 +230710,7 @@ CVE-2023-40486,0,0,a83f928f9636179621a9a22eb4e681aef6d1177ef61d83b3f38ce044f578e CVE-2023-40487,0,0,ae74d94247714de39db18229bcfec1084c5b5a6c591ba8a718a2ac5bbf7adc8b,2024-05-03T12:50:12.213000 CVE-2023-40488,0,0,6d9932a99868f3ba51fd20d98621922b5fea112d62f5687677942cc42ca41387,2024-05-03T12:50:12.213000 CVE-2023-40489,0,0,1b0fbddedbe1eba7f8d6447733accff90acbe5dd7ba43100381753fde689538d,2024-05-03T12:50:12.213000 -CVE-2023-4049,0,0,dd3841fc5981ecf6c1893cf4a52cf480f0db80acf80379cfd5e71dde4c51c976,2023-08-09T21:15:11.627000 +CVE-2023-4049,0,1,edb6d11e7c1dc5e695cfa8db3c1b22c55499fc0f077c615abed069e8494d3662,2024-10-21T13:55:03.510000 CVE-2023-40490,0,0,ffaaae63bf9476dd245ea2b1b05c4848a3a394ccd4a27d35c8f297f8972060bd,2024-05-08T13:15:00.690000 CVE-2023-40491,0,0,b8e05583b64f200d6827277cb79eb1645eff3ae05aceebc727f6edfbc6ef10b6,2024-05-03T12:50:12.213000 CVE-2023-40492,0,0,1383c09bc601f5cf41687f9e41f3cacd69fa75e8c3adff5771234a8f76fd1ebd,2024-09-18T19:15:32.220000 @@ -230721,7 +230721,7 @@ CVE-2023-40496,0,0,e07b3584ba620f5ac82b33a51d47f4b6db5cf29141bafd245a2386c9d2ab7 CVE-2023-40497,0,0,211e4ceb10f8230341965f4d26f72576b2d46d3ec80dd86afcce4098919f69d1,2024-09-18T19:15:32.663000 CVE-2023-40498,0,0,8c3c3c412caa7f09cefe68786071ba42775e538c386156372798f30f0cab15c8,2024-09-18T19:15:32.760000 CVE-2023-40499,0,0,0151b97ea369bd7b25160c6403930085e47cba4319f95af956184d9e8aa08a9d,2024-09-18T19:15:32.850000 -CVE-2023-4050,0,0,e46271bc483ab7a7e4d033e62ad111fa8e191a7d7b4525c05b9e6d295af75480,2023-08-09T21:15:11.723000 +CVE-2023-4050,0,1,eca414e86648b734bb43be13d618a5a9dd7ad3eba78a12b3139aa7437bf9bd3d,2024-10-21T13:55:03.510000 CVE-2023-40500,0,0,6b5126d7090bd2a93d6b8168862762a9bba0dbb3617e7be38b2c00a08a0ea09c,2024-09-18T19:15:32.940000 CVE-2023-40501,0,0,75baeb6c816bb63e7c384e6d546c6c81be287293711c9c31008508f55ef7b53c,2024-09-18T19:15:33.027000 CVE-2023-40502,0,0,ca47a92f877be96f466f860045142e5579f904e7059a363872bff431c798df94,2024-09-18T19:15:33.120000 @@ -230757,7 +230757,7 @@ CVE-2023-40535,0,0,3dd8b6e353e77bc78b3eaf66d47e8a5e362a0b31feec7a87804f2cc657d03 CVE-2023-40536,0,0,9551e2fe36c80eabdc1a2e97ded6be800d2fb9f544e15a4ec84bb644eba227af,2024-05-17T18:36:05.263000 CVE-2023-40537,0,0,75f58d7d08cd8fb906c24aefd5bbf6d6b69c82ba74790056d8b068a8723a2e25,2023-10-19T16:43:11.323000 CVE-2023-40539,0,0,acd3d042bf442094e597836496b1b9323a740bc93f77f5fe42a7bce86aacddd5,2024-09-05T21:14:36.220000 -CVE-2023-4054,0,0,53238c21c0a1eb83d08a1b3d2d86562b494ce0912d3fd29acf557c382ca3a9f1,2023-08-07T14:51:09.667000 +CVE-2023-4054,0,1,af330ca2e51293bcebae2d6f6f02c994cea6e05849c6f61e100fba721111a35e,2024-10-21T13:55:03.510000 CVE-2023-40540,0,0,1e03a01e888f27e7c3ca51db2a4bc2550b4a2afd268bf6a33f8cdd0d825d3736,2023-11-22T15:13:18.220000 CVE-2023-40541,0,0,daaec126802b21cc7a612331601c83efdf2fbb147626236fb6df03c2ce8ee7c6,2023-10-12T02:32:07.413000 CVE-2023-40542,0,0,3e94edf4177b263f441dfba9104a5c1faf5acb6a3d8e1da0c96b19398aadd4fe,2023-10-17T19:43:55.697000 @@ -230767,7 +230767,7 @@ CVE-2023-40546,0,0,6ddbdc19841f6cb290ec2b905e60bc26911fc88c11de04bc8a7d662cb4831 CVE-2023-40547,0,0,aa8c5d2793a75f3ad9a6a915b845d7aafd35608216f0b3f68592a1e5df2bf1b7,2024-09-16T19:16:05.947000 CVE-2023-40548,0,0,dac643ade65c1a191d65ee168a845e302723e7116b47e0d5a4611a62d6447ec0,2024-10-01T14:15:04.700000 CVE-2023-40549,0,0,409bbcdd4cb8887d85ad6922d10081d4ffe6d9a4dd03532a76d9c9a92dc5fdfe,2024-09-16T19:16:06.287000 -CVE-2023-4055,0,0,c84104f0c8ec282dfd40a04ff729cf2844caf560f3c96dbbf5c3172d6bb6b24f,2023-08-09T21:15:11.820000 +CVE-2023-4055,0,1,881117d2b62f04f51778fc8b13b75927f39c4c987a6e112e57951b3ae20b2608,2024-10-21T13:55:03.510000 CVE-2023-40550,0,0,7e315e619d697d87543604bbff3ef14f7418177adad4c5f0a7f3c6da81e8e2d8,2024-09-16T19:16:06.450000 CVE-2023-40551,0,0,6015c82d4677150430822f1faf7d1f0c96ba6952a50dbabd6ada6225e4354973,2024-09-16T19:16:06.617000 CVE-2023-40552,0,0,7fe5ec65193750dbc75f8e72724337bc87d791c5b7214d5dca88292f9d38f754,2023-09-08T21:27:56.877000 @@ -230778,7 +230778,7 @@ CVE-2023-40556,0,0,de58fe186b2f1020d026ffae947fb39dbfc6fd85de37930c26c30401ecc65 CVE-2023-40557,0,0,3bf2b397ce3609c07e1447ba3d8690991b98b23c568e53cca57115b5519cdfa4,2024-06-04T16:57:41.053000 CVE-2023-40558,0,0,d9bded5de9ca7bb0315ab4655cf0114aa43781be397f7f4855550ffc64418611,2023-10-06T16:25:05.677000 CVE-2023-40559,0,0,346b45cc4a075a124495f9f473e10d92f45160dc29983943d7e4ac13986a7691,2023-10-05T18:23:25.127000 -CVE-2023-4056,0,0,bc7b0b74832db9cbe47b797266c030b0d240a77ecfb4c0d200fb6fc0e24c1a13,2023-08-11T20:19:43.687000 +CVE-2023-4056,0,1,dab022637f04b993a2ce71a0c226358b8d1f6222d0864dce69c44e791753c24a,2024-10-21T13:55:03.510000 CVE-2023-40560,0,0,2ac7acb552da11dbd8db8d3a9f352b3544176079d47aeb4fc4b3a606679cd9d6,2023-09-08T21:22:09.650000 CVE-2023-40561,0,0,3026ef6bac008dd95d8f16dd0d67f2f87c167e758f891e01316af5841b03710f,2023-10-05T18:10:04.607000 CVE-2023-40567,0,0,5a5dccccfa357e32e21d1393c6606fd901aacb680c90ce141f0ee5ba31ccc650,2024-01-12T13:15:11.090000 @@ -234303,14 +234303,14 @@ CVE-2023-45723,0,0,d75569efe29622a0fceee924d9f808ceeedc0897b5e709cd04faad485aeb7 CVE-2023-45724,0,0,d957afe86c592e8319388b49220462c05dc155b1c149c8e2b8f7290372cc8a41,2024-01-09T18:34:41.837000 CVE-2023-45725,0,0,4be92db793dd202daa1a3bc98875d9a583e5498eb2cacfe9e3765b156e332912,2023-12-20T18:32:15.360000 CVE-2023-45727,0,0,fd816f9fab63a8b1a8932e920970f61987745f7a8a0c00ecf469bff7165fffb9,2023-10-25T17:31:59.553000 -CVE-2023-4573,0,0,e777799d316d57bbd4161fe82c1579488cc5377b1c462d5a2f27bbf3f3b3f3d4,2023-09-13T11:15:10.287000 +CVE-2023-4573,0,1,8c2c56b4c0641002c802a71d0b3ecc92540f29cc9ee6db1aabe5f4a00eb5a7e0,2024-10-21T13:55:03.510000 CVE-2023-45733,0,0,b0aa2fba9e6a64d0852357607afb3a43fdbb4b3413ce5b91e26ae220829c70ff,2024-05-17T18:36:05.263000 CVE-2023-45734,0,0,bcdee8c11a0e8a4792b5d7f342842becf89dbf6ffedf6c74619e3ac3b10011b3,2024-09-09T12:21:53.383000 CVE-2023-45735,0,0,76f7b0dde5ad0ef2feb1f58c93c13c77622124a13466b7c4afdea91dacec2686,2024-02-12T16:46:48.997000 CVE-2023-45736,0,0,a6555419ca0159c38ef7b0a59bca200e7278078be90e65579f60b26f5b1aa094,2024-05-17T18:36:05.263000 CVE-2023-45737,0,0,dd16bc4af85280cd375d597cc9a5e8ffdc9ecdd2d371e215f51a4aef8031d7ef,2024-01-04T17:13:57.130000 CVE-2023-45738,0,0,db7e3df7cd0566b344bce2c01482359e56ab3fea0bfed6e3972046f327585cff,2024-02-14T18:15:46.163000 -CVE-2023-4574,0,0,ae1cce3ae112ba087aa82a0f5184014c8ece1089909c8e26704c404f84867042,2023-09-13T11:15:10.507000 +CVE-2023-4574,0,1,e2d4eee9abe690ac844e8a765db5c387c81ef3945d001be7d4ae433a4a55b48c,2024-10-21T13:55:03.510000 CVE-2023-45740,0,0,dba039e94e03e9559d71dbd833f64cf815771e4d02393e1f45bcc6798ba50f85,2024-01-04T17:11:01.707000 CVE-2023-45741,0,0,7c08356114bac705aeac86b49592695362a09118c7192a55945a9f55c1f037f8,2024-01-04T02:34:14.733000 CVE-2023-45742,0,0,35452ecfeae9584d009014eba0ac410083f89f21227ec55f8af7eb076af13c09,2024-07-11T16:02:30.337000 @@ -234321,7 +234321,7 @@ CVE-2023-45746,0,0,5261d209b9f0379111e2d2b131e41b1222d3a89cd884fb6f783a6603140db CVE-2023-45747,0,0,5981280d4b995b51ff60fd3f0bec3ec84a08ed284e23916dfb06fcf65dc3c73a,2023-10-27T21:57:07.240000 CVE-2023-45748,0,0,c3b6b63cc459c60a50a9262d21d34b67d5c608fd27a69f6bdec66a2df6543ad7,2023-10-19T13:50:00.853000 CVE-2023-45749,0,0,42d9843ed3fd30227273b44d3bac6a616aba4f0f529c56858fd28ae93f6cf4bd,2023-10-19T14:06:48.303000 -CVE-2023-4575,0,0,2e0b7c5c62754ec1ee525630ef9d8b08b38ed3a4e7e14b54682171df40eb4cb3,2023-09-13T11:15:10.597000 +CVE-2023-4575,0,1,5104b10752d9b2bb14f66c3f1fe9baec655bd74c0926236c463b584325e61f4b,2024-10-21T13:55:03.510000 CVE-2023-45750,0,0,4be951f1e3ada2f82099f2ac23ae02472f961d981213de85f23bde3f99d28545,2023-10-27T21:57:14.363000 CVE-2023-45751,0,0,fb0805a43827c223f0f1e0cb4fe13efb9bd3d1a95abcd9acc4e74d8bb4d64170,2024-01-04T21:28:18.910000 CVE-2023-45752,0,0,2683ae6974526acdefb00d4eba54e0ffef8199ba657e4bbac89fe39f6ed0c4f7,2023-10-19T13:50:21.603000 @@ -234332,7 +234332,7 @@ CVE-2023-45756,0,0,5c772565df88589440d1f2da46c8e927ce7b68ed7f76c0e350ab2afc25854 CVE-2023-45757,0,0,0d28afe3c2a2c1a15dee6d186f6f64758efc0e7fdd6b1a33f73807bdc44c1fa9,2023-10-19T18:21:01.680000 CVE-2023-45758,0,0,0e266789ba56935603ab3f5c139fb68752aea4d95a06ae0175b8715d8ffb91e7,2023-10-28T03:27:43.807000 CVE-2023-45759,0,0,20d7b2d64aa465e7135f929ac70bbd4f37ca2ef29bbd807897891e1459ff88b7,2023-11-01T17:26:46.193000 -CVE-2023-4576,0,0,acf9824435bec7ae8c36bade0096d53f3f7cf34c27d4cbc42ecdb841b15b3c09,2023-09-13T11:15:10.727000 +CVE-2023-4576,0,1,53af4f291cfece71b3fdc365ea520533142da102f77a16b0f7d8b97650fac7d9,2024-10-21T13:55:03.510000 CVE-2023-45761,0,0,aa28aada132ab130678f4f50ca3356b6b2c5b8b371d3400d9cd712dfd8968e27,2023-10-28T03:27:51.290000 CVE-2023-45762,0,0,e2858e36248565d88874c045326e2dc34db107589497fc62d466f57e5c38b505,2023-12-12T16:53:04.993000 CVE-2023-45763,0,0,06627a1a8bf639004c20dc9e40f5d4a22accb7f5244e96a1331d1999c38dc004,2023-10-19T14:19:30.943000 @@ -234370,7 +234370,7 @@ CVE-2023-45806,0,0,c1d82839f9b3b7c740dd24532a87b9e3bee5254b3d3bbe5ae77b236b84ccd CVE-2023-45807,0,0,45b4cdae3eea17d5aab803029164f645e212faaa66fd5342e612cbe3ad9897b5,2023-10-20T18:29:38.150000 CVE-2023-45808,0,0,97d38f0b04f7027a3bd5a82685e603838f4be5f0c105cd71c1ce5e82320872fe,2024-04-15T19:12:25.887000 CVE-2023-45809,0,0,d7805f5ba92354d46e87048136f9003052f8ba49fb078a3a483750692951896f,2023-12-28T18:58:51.657000 -CVE-2023-4581,0,0,b7d82e4b9d4563ae9afb8aa6f3fd48f3af56e58e90205787e4c25049025f95e3,2023-09-14T03:52:57.273000 +CVE-2023-4581,0,1,739ef102936e33253a67ee2be122f40f2a6310b4d09cea8e3229281e5cf6f419,2024-10-21T13:55:03.510000 CVE-2023-45810,0,0,9646e4c78af59dedd41653176b5d6af5b784582fb2a546ec42b5c70e65bd7104,2023-10-25T13:38:33.620000 CVE-2023-45811,0,0,dca05a8ad9fa809dc726f63e7d0376e900cd168363b793b797745f991631d558,2023-10-25T13:33:35.367000 CVE-2023-45812,0,0,6985871ad98904599fc2082f5c372e7f0150694f2f33c1a8658fe8f2a8981823,2023-10-30T14:55:59.993000 @@ -234402,7 +234402,7 @@ CVE-2023-45836,0,0,4e145b03b40d450c701d9dbddae839148b8c8083028fb940b318461727364 CVE-2023-45837,0,0,63b70288d74158fd37f43a94fe5756958710b63e6adea047a71b4754f7dfef8d,2023-11-01T17:33:02.503000 CVE-2023-45838,0,0,89771cd141405665d2aa8f80ca25c4309d489c390d1b66b05b804f8ad3eb773b,2023-12-11T15:22:08.430000 CVE-2023-45839,0,0,e80416fc021ec19e90ce2890408162e928e75e50742bd82d5d77f93b4d774b85,2023-12-12T01:06:18.090000 -CVE-2023-4584,0,0,6f8125e388b24f6eeb13ce5818742c2a43cd06ff757a0ba85ebc4969c490f917,2023-09-14T03:45:38.877000 +CVE-2023-4584,0,1,fdb595e5ed11443fb0c7d974e54a7bb1b678a2e7d29b7bb9b3427bd5252a3733,2024-10-21T13:55:03.510000 CVE-2023-45840,0,0,df973b2e8c97900836bef187707be4cf10eed2282b1298cd4024c6667ab38e5f,2023-12-12T01:10:35.810000 CVE-2023-45841,0,0,1f4140d44e02f2de4a61e4c6d9b7ce1bee958abff34d1eb78de4cedcaeb8b990,2023-12-12T01:13:22.923000 CVE-2023-45842,0,0,62abbb5cf696c9d19fa0073ea25fc08fed7f350bebf1feff7f37c5f0451cd570,2023-12-12T01:17:12.297000 @@ -235799,7 +235799,7 @@ CVE-2023-4774,0,0,18865190999a54b58dcf753cd88068601ff8cb29b163a504c848eb5e82d8b2 CVE-2023-47741,0,0,07ed2bf6487f48a07e4750c673f73aa41a9be63fffe97ac9a7b130ed32a47cee,2023-12-22T18:40:58.353000 CVE-2023-47742,0,0,cf1580524fdfb70e6e1c234702ec4b35002041f3835e1ccadb31bb3da069cf7f,2024-09-20T19:15:15.010000 CVE-2023-47745,0,0,1bf9cb8a6a3cf08ea87c57aa68501149beb571cfa9b7d65e08311382ded95d33,2024-03-04T13:58:23.447000 -CVE-2023-47746,0,1,54595e478c33a0a57da044e4cb95da02acbcf10456b5e2282f99d44728d414a5,2024-10-21T11:35:02.647000 +CVE-2023-47746,0,0,54595e478c33a0a57da044e4cb95da02acbcf10456b5e2282f99d44728d414a5,2024-10-21T11:35:02.647000 CVE-2023-47747,0,0,ce0dc882764a3bf433c80d1ad11103c3affae0b9634cb24c76afe53497aa6138,2024-03-07T17:15:11.373000 CVE-2023-4775,0,0,0841415a7acbcb3b682f030c4b656de961b85344f29333d92c4892c4a1e96b07,2023-11-17T13:59:12.040000 CVE-2023-47754,0,0,1cca6aeec3c31b6001da330ea724e3906aeb0176b4cdce69ee5a584d838f6062,2023-12-22T19:33:56.743000 @@ -239530,6 +239530,7 @@ CVE-2023-52913,0,0,0dff51631ec1ab5b0464af1dd4af3149cc942bacf8d31e47da582f111f384 CVE-2023-52914,0,0,3e2f63e6fcc2429a7a056b2f17033ece733c3917a2a011b1363b92bf8c84ed22,2024-09-12T14:07:17.137000 CVE-2023-52915,0,0,ce3c89a4bf7cab80e859d29c06c18dc19c9bdeb973ab832dffae6eeb3861fdf4,2024-09-10T17:12:41.607000 CVE-2023-52916,0,0,bebcac5d0a36cd875bff11f8b42fd7bc5076a3c1c94e9b8c44be74509c12a53b,2024-09-06T12:08:04.550000 +CVE-2023-52917,1,1,90e05fcff592dedf0d13c7b7307ad596010e9baabda0c4fc709b8aed346cfb7b,2024-10-21T13:15:02.230000 CVE-2023-5292,0,0,214d7ae5654e29ed0e372211abf39e379cdbd830eab553609e162ffb791fd787,2023-11-07T04:23:48.910000 CVE-2023-5293,0,0,37b5570c94c226fac17bbeba13451e285dd87937cebf55577645a70e3fbcf851,2024-05-17T02:32:58.843000 CVE-2023-5294,0,0,91871d88408d7e2bcaad4b05fb484ac2315248d3665cd88ba6ae47f2da8d5f16,2024-05-17T02:32:58.950000 @@ -240601,7 +240602,7 @@ CVE-2023-6446,0,0,bac85af63fe451a7fb1753c85f4eb5ad583f9e3629cc0a34b2a98e7bc62f99 CVE-2023-6447,0,0,7cdb81f50f4539b44b97418080684d7f862ce1eced3b54bc67e6c5a23e3d79c3,2024-01-26T19:43:45.243000 CVE-2023-6448,0,0,f7f271f9b08baff1e70e4a44ec3b05327ba7aad4658ca132cb49aa8e275080c4,2024-06-26T19:59:41.147000 CVE-2023-6449,0,0,a7f9c2b5501cdd9fc21a14160551e18f6c2ae8e1d2fbbd505e7a7b32722bbf0e,2023-12-06T20:56:48.923000 -CVE-2023-6450,0,0,e76b7b0addf647726eba5bc734dd23c4b1f2101780b0fb20f535aa0ca20caeb1,2024-01-26T15:59:00.420000 +CVE-2023-6450,0,1,ffe575b5c25385c09b52b6525d0cc3e8b6999b5db24640bee920a74f45422014,2024-10-21T12:35:05.010000 CVE-2023-6451,0,0,f12b562c1c96070fc5e29b85d7db92fde3d7bad88af9e8831d139b62eb69a5b6,2024-02-16T13:37:51.433000 CVE-2023-6452,0,0,4a403935ac18398cc8668e411c25d7ab529c8b44d6a54f7c1e1a856f64c7ea31,2024-08-23T16:18:28.547000 CVE-2023-6456,0,0,e46e0d37304e52e0bebade1bd99fe797a2c17dba35b72ee4232c48409ec0198d,2024-01-25T02:02:23.760000 @@ -241961,7 +241962,7 @@ CVE-2024-0712,0,0,3fb9573a502c454194a4857491cff2f36eedd7f3c2426e3d2df4a7f88c3b0d CVE-2024-0713,0,0,19f60025c4155bf7de0537e7e8eb678261781f77d92ff4f5f15ec17a5758ffd3,2024-04-25T06:15:53.647000 CVE-2024-0714,0,0,a95071f9555912b42efd1d7c92cf91f38c123540c2ae25d994a125bc1b139492,2024-05-17T02:34:52.977000 CVE-2024-0715,0,0,f8cb26489ec51d1fa43c2659968003ad3b7aa60a3876f454a1b2574f5e9f375e,2024-02-20T19:50:53.960000 -CVE-2024-0716,0,0,8e6b2fdcb27f1624a185289b58820e6cc6c66d6a2dd5855055723b97b9526a7e,2024-05-17T02:34:53.103000 +CVE-2024-0716,0,1,e5a8394003ae5ff4ac51125c6195a41d37237324bbaa44e66bdb4f301802bcc7,2024-10-21T12:35:06.143000 CVE-2024-0717,0,0,c80d0e0903652aeaec6ef5345b7c2c7d1e5c5dd864fac363471b78345fb15b03,2024-05-17T02:34:53.200000 CVE-2024-0718,0,0,8f01d85ce11b5f3575aed1ff76257b1752cf61aa71862adce6e28abedd6affef,2024-05-17T02:34:53.367000 CVE-2024-0719,0,0,667e024c39f0603eb8317ee83a8c30407bdcd28e6863dc848e59405baee0a875,2024-08-09T19:35:03.203000 @@ -242015,7 +242016,7 @@ CVE-2024-0768,0,0,b981d6a828aa2cf73f09055d3776078604b67055cbe20e24d07a3723dfb432 CVE-2024-0769,0,0,f97a5afd8682a468504e77a3058ac8d351cd094f13e4b24be8a054697210a922,2024-08-01T19:15:24.740000 CVE-2024-0770,0,0,0301468bbff23f9f3ffa725bfd8bb2e6a5e267008f3f26439e89cce72c00d5df,2024-05-17T02:34:56.967000 CVE-2024-0771,0,0,e9fd8856cf582620cfdd5e4f2261f11aa03e31e015674b28a5f813b4540d1bde,2024-05-17T02:34:57.090000 -CVE-2024-0772,0,1,e8c3e00f556facf03b1bf5c2dcf04b560d5584b9039fa79b01aa0c23c3436c8a,2024-10-21T11:35:03.773000 +CVE-2024-0772,0,0,e8c3e00f556facf03b1bf5c2dcf04b560d5584b9039fa79b01aa0c23c3436c8a,2024-10-21T11:35:03.773000 CVE-2024-0773,0,0,da49347ba72c1237356f9962b2eede4c8e78af543363f7dce053234a6503bab9,2024-05-17T02:34:57.303000 CVE-2024-0774,0,0,15c49eaf793f25ab22e8feb6cac6347d66353d7ca680118b3df214ff5f1c3a04,2024-05-17T02:34:57.413000 CVE-2024-0775,0,0,04e79303aed834c3663e22288e6d782f176be85607f62a433c753d92c4d1b779,2024-01-29T19:08:44.387000 @@ -242229,10 +242230,10 @@ CVE-2024-1001,0,0,481a263280d7671352a0e81cdb22876e1831937aba78d275dcb085f339a7c9 CVE-2024-10014,0,0,1395463dc1e29fd6db71d83f72260a8cd3462c205364f301260cc7f7b129af31,2024-10-18T12:52:33.507000 CVE-2024-10018,0,0,2aa14605c63d984e9b2fdfd4b3872cd3e6ce36a0ab239799435cd07454bf385f,2024-10-16T18:35:03.460000 CVE-2024-1002,0,0,da9ff0a1d838ebe2cbec1ae9defbaf7310d6b3493363163f0389be14aee69800,2024-05-17T02:35:09.013000 -CVE-2024-10021,0,0,b64cba7877ea721922fd9553750d3658ce15b0fbcf55c5ea4ae87d247d1eced1,2024-10-16T16:38:14.557000 -CVE-2024-10022,0,0,179103672e0aeed9e6408e50e4dad1de0d3bd3faa254d71bb9fac2b671d4300d,2024-10-16T16:38:14.557000 -CVE-2024-10023,0,0,cb42ebdfea51270072be77300916c7b0a6d8c5a09a15ab30370e563d437de89f,2024-10-16T16:38:14.557000 -CVE-2024-10024,0,0,eb6ac65d06bcb1b2ade71a00cb57bf7aa44a3f398307144a0422688c594b9a2d,2024-10-16T16:38:14.557000 +CVE-2024-10021,0,1,6df5b82bec28e371ca7d7ba7f52fc071f45722354fdfe7b2e6f4842f1f48ebe4,2024-10-21T13:13:25.677000 +CVE-2024-10022,0,1,92e93478773b21ba9b2d43e5c324e5c622d589913a6faa7f64ee1349beb7c2dd,2024-10-21T13:14:02.203000 +CVE-2024-10023,0,1,fb7a2d87c1d01f1c0f753ee2a4448f391382353000e2526f44469dfe5432a49f,2024-10-21T13:14:37.300000 +CVE-2024-10024,0,1,341fb3a51358c0d5f83894d8ffa34bc8830630ac4903510ed67f09db34646b2e,2024-10-21T13:15:01.730000 CVE-2024-10025,0,0,19a46c25128674d2a3df76dfa6881dd0177e057f9e034fa6abc2c0a4e8bba033,2024-10-18T12:52:33.507000 CVE-2024-1003,0,0,5577a6ad54fba7e1e984add6f75aca7e6ad73817623f9ed150fa33b583cd3fae,2024-05-17T02:35:09.147000 CVE-2024-10033,0,0,c0a9b2336bab3102cd006cc0abae51c59fa7520aa657f85607505772ed524766,2024-10-18T12:53:04.627000 @@ -244140,7 +244141,7 @@ CVE-2024-21169,0,0,75cfaa7dbb3017d69d1c32e7c9a3a07923f1edef87ef625d3961fd8622ff3 CVE-2024-2117,0,0,79d7dda411024d417201240caa69efdac6b41c6c0da01c1949cb476b1159e785,2024-04-10T13:23:38.787000 CVE-2024-21170,0,0,af70aab138e0b6f00f1af224e9aedbd73a234a8cfd2b7ba1d7eec319bf92e458,2024-10-17T17:11:10.947000 CVE-2024-21171,0,0,2fd05d07a23e14dbd131721fe68544117ce9a854c5a28a6e860a4826c9defab4,2024-09-12T20:42:17.600000 -CVE-2024-21172,0,0,cb0507b50b3037a8db36d10352b1d6694cf00943ed618a92c696e5d4157515cd,2024-10-16T16:38:43.170000 +CVE-2024-21172,0,1,34605c01b861f523beae8f34a8a5378aeef5fdbde4809ce2491bb573bf414892,2024-10-21T12:59:49.070000 CVE-2024-21173,0,0,0a12cbbd305217530b1df35b14cfdef98657ded6769d894b09583b79eff2a588,2024-10-17T16:39:26.610000 CVE-2024-21174,0,0,ba6844261aa04c1ce6ded1964dc44516b30559a14a2b47a862fad5fb6e961d86,2024-07-17T13:34:20.520000 CVE-2024-21175,0,0,cb2af54db467d6cb3910a785f432573ba67f0e2903d99aac799349b33385087b,2024-07-19T13:35:41.107000 @@ -245585,7 +245586,7 @@ CVE-2024-23204,0,0,afae0f8b3e19ab8973af8b7a3b489e4bd91d0fdadf5faf2aa71183f3a9158 CVE-2024-23205,0,0,46b64236625fbaaf0a915402a4b741acf85987fab398b6cf9dbb0922bde0ced0,2024-03-13T21:15:55.680000 CVE-2024-23206,0,0,507c84e2d0e52cafc2157e9d16706cbde18b562da92731ec0900997e5c935fac,2024-06-12T10:15:29.787000 CVE-2024-23207,0,0,3409f59ce48ebab075a426e39ec672741159cf18513a93ddf138321de73422df,2024-01-26T21:23:37.840000 -CVE-2024-23208,0,1,fb50bbc6e7452dfc70caf10aadd5a5063e9a046d2405a71df1d4be3aec2b5c7e,2024-10-21T11:35:04.960000 +CVE-2024-23208,0,0,fb50bbc6e7452dfc70caf10aadd5a5063e9a046d2405a71df1d4be3aec2b5c7e,2024-10-21T11:35:04.960000 CVE-2024-23209,0,0,846cb27f552aaadf5cf6e317beaba3cadc348f1547e81e3468c7046617d4cbbf,2024-01-26T21:13:02.737000 CVE-2024-23210,0,0,d20caef0f5b0caf29c1a27ca00402686678b4b233512ddefd3ee6493d3b08add,2024-01-30T17:21:38.127000 CVE-2024-23211,0,0,605ceebfa294fbfd53041cbe5fe54f06cdc8f1206174f424cd01c5dbf8f99d68,2024-02-26T18:24:10.707000 @@ -259541,8 +259542,8 @@ CVE-2024-43161,0,0,f37be14abc8091c71cde7262837d69279328cabb479eb142cdf3874611ffd CVE-2024-43163,0,0,37bfbcf03c9dab4ca7e97266471b7b8dae4977f26d227e4b5cbdc4808f3a597c,2024-08-13T12:58:25.437000 CVE-2024-43164,0,0,7fbbe7ee9aa78038cf3c84e491a5f4242c8267e5471c6fb174f927d6da6e8164,2024-08-13T12:58:25.437000 CVE-2024-43165,0,0,8125472d7e20e379acd67d29cc7075b43b03a71223ce60c46b14d0ffb4bd9a07,2024-08-13T12:58:25.437000 -CVE-2024-43167,0,0,4e0990bddf2f78bd7962e7fefd45b238c4cd5730031930510e72195ad3b2dc76,2024-08-12T13:41:36.517000 -CVE-2024-43168,0,0,dda21c5c2e3bbeaf5d69baa1c2ddcb5d63c7d6cc03584943a831db0d376f97f0,2024-08-12T13:41:36.517000 +CVE-2024-43167,0,1,c4eae034ed90d957ee0d40ac6b75e1eb711889b4b8905f404c5783e222980273,2024-10-21T12:15:03.837000 +CVE-2024-43168,0,1,ef0081344887975b429a2b0b7741a490ebb03d62e914345ff88e9fc7663b3374,2024-10-21T12:15:04.327000 CVE-2024-4317,0,0,2ab51635ebb5a78f9093ee7220532c2f98c47bcb30186dfa33cf412783a7fe8e,2024-05-14T16:11:39.510000 CVE-2024-4318,0,0,3bd63bc61468b7ca3d2d40c33a55eb01fa72ff95d7d5fb5f0e4f8d9b094da54b,2024-05-16T13:03:05.353000 CVE-2024-43180,0,0,abb2e48a138ce8e840850ec2c73107ac445b622170d298531958775b0aa3e8a2,2024-09-20T17:28:06.617000 @@ -260102,7 +260103,7 @@ CVE-2024-43941,0,0,65eb65a5b19127de85b2ed3f09e3f3a2fc43c5d3fc64b0022b1df003f93a2 CVE-2024-43942,0,0,e66d301ff91d4e3d6c85080e28c55dc563393fe5e437a624aa40d0cb331e6a52,2024-09-05T15:25:59.153000 CVE-2024-43943,0,0,0708a62e7be84f809da9677b73fc0a902b7d605c03fc359ea64fa95773946d2e,2024-09-05T15:10:48.663000 CVE-2024-43944,0,0,3b43949b67e3b5293c2c106f6d4c5bf9b7b47da0cd6c64d08fad13e8014c08a4,2024-08-30T13:00:05.390000 -CVE-2024-43945,1,1,81fa79c19cc3b716e3d2d242ad13680f89aee2fe136785c815bef525db6ab04d,2024-10-21T11:15:02.933000 +CVE-2024-43945,0,0,81fa79c19cc3b716e3d2d242ad13680f89aee2fe136785c815bef525db6ab04d,2024-10-21T11:15:02.933000 CVE-2024-43946,0,0,f240acba317febcf1e96ae7507bd3580d8fecd1103a0412511da00f09d6e888f,2024-09-03T15:21:07.167000 CVE-2024-43947,0,0,00adf93b652a6a1fea9f57602f2aa8edc17efc755f7abf02b222226d3eb2a44e,2024-09-04T14:16:00.423000 CVE-2024-43948,0,0,f60ff73d80da3808d8af4258622a438dd588d368d767678c8fd4008f71ea0306,2024-09-03T15:22:20.567000 @@ -260643,8 +260644,8 @@ CVE-2024-45060,0,0,83a57138238cb06a814cf1f01df1fffbe4a9e82af20e4c1164e77ac214e2d CVE-2024-45063,0,0,33e08634550506363c06b675c8eebdf6582cbbe73548148f8e40aee753dad000,2024-09-06T17:35:18.370000 CVE-2024-45066,0,0,a454e9ceebd31b55929c2c0a2d42869872cfc6fb29fa46b222f3049d82b952e2,2024-10-01T16:18:10.680000 CVE-2024-4507,0,0,feffcf27ced8e6be5fca9d21b321343c494624929485135b513ee1c93a346051,2024-06-04T19:20:40.250000 -CVE-2024-45071,0,0,355d81a286ddacf71570f64464f10f9619d3a172a5caa5f85f897fc410f779f4,2024-10-18T12:53:04.627000 -CVE-2024-45072,0,0,1a7a9031c5d4a02a438d8ed55b4c60cd0a0e85ca284597bf79c988e1c3eb181e,2024-10-18T12:53:04.627000 +CVE-2024-45071,0,1,3bfe93752746c249962746373671b28be950445a9667f67fa10fa73cbdbe89bf,2024-10-21T13:41:29.383000 +CVE-2024-45072,0,1,b27748da4d45b977847cef15e3110281ca75cc3297ba880f9183987a9db911b5,2024-10-21T13:41:20.463000 CVE-2024-45073,0,0,e6a4e9e5d55d10a2984ecf959bd3646673680e37d22c364c1249e301fdb07f55,2024-10-04T13:51:25.567000 CVE-2024-45074,0,0,410d152e2b1ce535bb792f747dab438d63c99a6f6d04953bcc95f60bfd46ac78,2024-09-06T16:45:32.767000 CVE-2024-45075,0,0,72725abf8f0bda55b265624cd19c42b954d17e9672b7c19951b6fe04531ef578,2024-09-06T16:45:12.980000 @@ -261803,7 +261804,7 @@ CVE-2024-47324,0,0,9d0a8be9058b908dcef652c569e8b2141d19736e2ee3f4e8dc4463e949bd1 CVE-2024-47325,0,0,2ca5e9aa4ccab3eba097bd7bbcbc5e60fe130cb0752b918f5c433159e8deafa6,2024-10-20T10:15:03.180000 CVE-2024-47326,0,0,becaddd8932d32a061dc10bf0f467953cb83f3406fc8da77294097e28e38b53b,2024-10-07T17:47:48.410000 CVE-2024-47327,0,0,c538510929aaa1efef8590e5c0955bb05270eb6eca4d47152891a99d515cb043,2024-10-07T17:47:48.410000 -CVE-2024-47328,1,1,c2cdd6d419933611be7f52b79207d671756fa9f24aa2a2543034429aa016bad4,2024-10-21T11:15:03.393000 +CVE-2024-47328,0,0,c2cdd6d419933611be7f52b79207d671756fa9f24aa2a2543034429aa016bad4,2024-10-21T11:15:03.393000 CVE-2024-47329,0,0,8f9cf4ad2ce9c10f9ea9bbbdd9112304e1d41b0ef8826075f80f55633e097d19,2024-10-07T17:47:48.410000 CVE-2024-4733,0,0,bab73609d3aaa55dacedcdd69b9c9d83fbc709adf98853b3adb423b13daf2498,2024-05-17T18:36:31.297000 CVE-2024-47330,0,0,8e1bb94d03c47cc1936bb0a3abc1d94c591039097eebb503639095132d634032,2024-10-02T17:26:49.470000 @@ -262022,21 +262023,104 @@ CVE-2024-47665,0,0,e8a6fa909a361ab6d7cc78d96e16742c4b3f809215ea5c8834927031949bb CVE-2024-47666,0,0,a5a9f51120f3c9ddd4e33149f72ef447bc4c927097f5851c64b003de19643664,2024-10-10T12:51:56.987000 CVE-2024-47667,0,0,38ec78121e570b51d421eb5ff7db3ba1ac7cdc0e7f949923732012891a8b3d78,2024-10-10T12:51:56.987000 CVE-2024-47668,0,0,e001990644657b5cbf026f76d790a5eb95d1d99bc1acc218664334dad09f5059,2024-10-10T12:51:56.987000 -CVE-2024-47669,0,0,d3c74651e473e54b2c771d191973d6a5578ab2b7d18d9d43bfaa9bdec83f3cc4,2024-10-10T12:51:56.987000 +CVE-2024-47669,0,1,cc07106cf0c3934e18c2295dc4d9599646844641786bb44db10c2dc10f6e6435,2024-10-21T13:28:34.330000 CVE-2024-4767,0,0,ac8fd08be8bf5dfebff2c5bd3958a6b91cd60ea11215d2f819ca56e82a8bdf8b,2024-07-03T02:08:05.290000 CVE-2024-47670,0,0,47fba4dee4b00f21dbff6c6decd1bc6ab83cdd30571ca10600e97efb139e20ef,2024-10-17T14:15:13.560000 CVE-2024-47671,0,0,6ed788244a5b1c264869a97a389632df94bcd4e1ed09a4e006408f0739ce7d92,2024-10-17T14:15:13.697000 CVE-2024-47672,0,0,208c9363d63200a0f87e54b2ecaa4588cdcb8ebe0fa60448ea15f5f621cd45a2,2024-10-17T14:15:13.780000 CVE-2024-47673,0,0,2317135deeb5a2ba1be6a2e702cd3dee3239bc7e08807d40785f15a0d93329d9,2024-10-17T14:15:13.853000 CVE-2024-47674,0,0,577054bd094ccd4f02c1335a12c85ee8c96c43e2d348ef1516b825d8eccd5d5e,2024-10-18T14:50:02.710000 +CVE-2024-47675,1,1,71bad2ca252fdc5023b285ebcd87743168cb64c6da5063a889a2fcdc4e2d0414,2024-10-21T12:15:04.600000 +CVE-2024-47676,1,1,b4b5a276baf180b81e8a7392caf17abc89e69a4f8970b417cb97a24a79e7d79e,2024-10-21T12:15:04.687000 +CVE-2024-47677,1,1,d8a88fa8eae1035414344b4a4132e47b2bd942cab45c86247c9e03932612a965,2024-10-21T12:15:04.760000 +CVE-2024-47678,1,1,deca0d1b3d5e3fcce13cdc3560805649955b22e6bc4489e112122c8824960b65,2024-10-21T12:15:04.837000 +CVE-2024-47679,1,1,efba03814b01e3588295f412c9bbbbbdb0eed657938b873e918400c8337c5058,2024-10-21T12:15:04.920000 CVE-2024-4768,0,0,eca965b33b3bb965dbc6e4fa576e2b459dc24fb57cb15a91596443aba7e291e4,2024-06-10T17:16:33.883000 +CVE-2024-47680,1,1,4774aebb8cdd5c3ef6d4b77778fb9fed1ff9f8aa64a775026901621b82c3a903,2024-10-21T12:15:05.003000 +CVE-2024-47681,1,1,1f8d5e55b707084a451bc0d698e58141712f386032e63c49972f8b1a660844e7,2024-10-21T12:15:05.080000 +CVE-2024-47682,1,1,90c592a7d2d7afe8c2d63b0c9ede45c0f20d839998f2f91b9792ca9e88bf534b,2024-10-21T12:15:05.143000 +CVE-2024-47683,1,1,99eb50b1ecf33631b9ead5f894c980abfccdb4ae6bcb06976070c658f9c23e4e,2024-10-21T12:15:05.210000 +CVE-2024-47684,1,1,b438891cc435c2769ba0b167529aab22f3d6d0de5d0193ac69cdf84dc67078be,2024-10-21T12:15:05.290000 +CVE-2024-47685,1,1,7e94939e2f17bcb90d4717534eaba41854af373a9216aaae7263f45ba536690b,2024-10-21T12:15:05.397000 +CVE-2024-47686,1,1,d2b34643049b01af39677515e5089f6fd38022e86821039e3480825520e05acd,2024-10-21T12:15:05.497000 +CVE-2024-47687,1,1,1772fe51e0742b6a4d106980b72856dacb7d8b491dafe0b58e02a12e936d4c65,2024-10-21T12:15:05.580000 +CVE-2024-47688,1,1,9d53be098474422f9a513a081bf58c643475f268b522a1b2cac0f8878ca6f563,2024-10-21T12:15:05.653000 +CVE-2024-47689,1,1,dd43837819c5427415b8ae5ae63bf6d169418051c3efde0e35ad8fcea0bb7b03,2024-10-21T12:15:05.733000 CVE-2024-4769,0,0,27e569a8d015b1733830e438c3e7532f74e5dc1a595d9d72a9cda524aaf6545e,2024-07-03T02:08:05.617000 +CVE-2024-47690,1,1,3580fc6fb65ea2243d499ad02f0e9c5270c437c584e911259c6e09192c61427a,2024-10-21T12:15:05.800000 +CVE-2024-47691,1,1,d215d5e94b01fad9c353c96d21b7eeba61b32c540772beeef2329fe4bffb093f,2024-10-21T12:15:05.880000 +CVE-2024-47692,1,1,77398bb6a4e5ea1237d43a30ae678dbb19536ca739f061adba41e8d3e6fa5742,2024-10-21T12:15:05.953000 +CVE-2024-47693,1,1,ac547a4d007a30a4671b7ea04a45647e3a9982087d336566125068341be2ac3d,2024-10-21T12:15:06.033000 +CVE-2024-47694,1,1,e8795f7cda2eccd6f65cc6ce8a29d1e91d548e5f95fbfc1681859ef54a45a22e,2024-10-21T12:15:06.107000 +CVE-2024-47695,1,1,718fb9024100a4e8f90a3bc43300b937717722b0d74ecf5b73638878b08160e6,2024-10-21T12:15:06.180000 +CVE-2024-47696,1,1,b271f81eeed11bb026b7ef7d2c06c49ca5d7ee07347e61dabff48a2b1a76f3c6,2024-10-21T12:15:06.257000 +CVE-2024-47697,1,1,09117da89cc3befd33bec8a24a5722a9b0b35b04d1c10443e0eede80b132376f,2024-10-21T12:15:06.343000 +CVE-2024-47698,1,1,111b7bce805ed2a54f2c3cec0ed6d844c321f0d2fced3ebdeaa4f875ee004322,2024-10-21T12:15:06.423000 +CVE-2024-47699,1,1,42f04e819cc91e83527a8d010e5f2d8d2aa3ee18f1d493e005ab72bf2780d24d,2024-10-21T12:15:06.503000 CVE-2024-4770,0,0,9501f8bb52643b4bcadd7b11da17e463cda395ec382733177c6b60e7ef1c0b7b,2024-08-01T13:59:34.293000 +CVE-2024-47700,1,1,a12323d936e7705f7b355610887ec19f4822b58951cf259c9656756a479c1d3a,2024-10-21T12:15:06.593000 +CVE-2024-47701,1,1,c5d02f5cf27f5c59e56ba788fce9fb5e9850fb3660d812e8cfc1b7192860169d,2024-10-21T12:15:06.663000 +CVE-2024-47702,1,1,a730dc5905c2a76b000909f9e54d401dfb5d30378a3e32504feee69f659286b2,2024-10-21T12:15:06.743000 +CVE-2024-47703,1,1,f3193f2d3f96510356f5c8c763452ceea1dda57fce7ef86e8bf303bd364f7208,2024-10-21T12:15:06.823000 +CVE-2024-47704,1,1,15ce4f32550e7735c59d931aa4ad922b79b9fbe3d56b3bff28602e5dfec78f27,2024-10-21T12:15:06.923000 +CVE-2024-47705,1,1,5c7ffc390ae990c674ea67d7264ef3718c18bb9448f4d8647462325d3461bc6c,2024-10-21T12:15:07.020000 +CVE-2024-47706,1,1,552ed15ef6d5f9e18230f5b7798235590ae606c2b3ea576e067f546487563ef7,2024-10-21T12:15:07.120000 +CVE-2024-47707,1,1,b5b67169a2ed7cf59914e709126b0d5884e0bdbfd87654cecbc96e4905fb1603,2024-10-21T12:15:07.220000 +CVE-2024-47708,1,1,3d50ae476caea56fad4ddab9ba154d9e32811dda21e3ce33e50512e500e0b36c,2024-10-21T12:15:07.313000 +CVE-2024-47709,1,1,b9a2ce062eec3be970ff752bf21f73d3177dd7cf0fcf359feb296c11fc14151b,2024-10-21T12:15:07.397000 CVE-2024-4771,0,0,65ecb44d66f4d1dbe0ceedf41bce3009ee95c66c5cee70725cf485ae8cc22e85,2024-07-03T02:08:06.447000 +CVE-2024-47710,1,1,2203477f4e1e12fb61bef104ac8081d526f66c221be10da1a86b2dbbf7389a95,2024-10-21T12:15:07.483000 +CVE-2024-47711,1,1,00ac629a1d013ef9d3973c42dac24cff3ccdf5d24245961ee738befd77183475,2024-10-21T12:15:07.563000 +CVE-2024-47712,1,1,eadb477ced294548477149ec9602433f0498e18038e5ee227a8beee8bd5a0887,2024-10-21T12:15:07.640000 +CVE-2024-47713,1,1,9888fa6be247b6244bee7e8ab2e04c4f8e1d685d5e9340d7bb7eb9763cffd607,2024-10-21T12:15:07.717000 +CVE-2024-47714,1,1,459c846f206631031018f0a3d9d6951e83219cee28d7990bd2abf7f95aaea5b6,2024-10-21T12:15:07.797000 +CVE-2024-47715,1,1,2d75c028eb07d5ed0d15ff550c9bf1c5178ba286ace46455bcd2972f6abad1f9,2024-10-21T12:15:07.870000 +CVE-2024-47716,1,1,f09a4c5b0cb3dfa456f66accb2a7133893322a1692f96d6d2bdad294f601a16e,2024-10-21T12:15:07.943000 +CVE-2024-47717,1,1,f0519f401a9576ffb54d09a8679104ded34ef44bed2278482ace7dd1103d5766,2024-10-21T12:15:08.020000 +CVE-2024-47718,1,1,580351a3fd9d3d5bdccfb68a58482f508716f9e5c885f11fc7daacde0113781f,2024-10-21T12:15:08.090000 +CVE-2024-47719,1,1,37cb740726ffa09e3a6d1899dab6572e173aabe036f62895d4999f27874459a9,2024-10-21T12:15:08.167000 CVE-2024-4772,0,0,49f0c7fc95339e6e98a7cbd8d8849904a773b2a05345b7622006e8647831f13b,2024-05-14T19:17:55.627000 +CVE-2024-47720,1,1,82f77e3a2095a0de8da8fa6b60bedf0f7c05ad42df9c90b18d2123f49f027d99,2024-10-21T12:15:08.240000 +CVE-2024-47721,1,1,c8ea91c5ff9b9119d3af92b904ee756bae1a8c05988a737bcdfca8723b69682c,2024-10-21T12:15:08.313000 +CVE-2024-47722,1,1,68c8d2f090df61a9f49a1f01f75a7ac8cda9d407591cfa0dc0a92c1e0656c53f,2024-10-21T13:15:02.360000 +CVE-2024-47723,1,1,a9f03915394300fce65604036e25655f6948d3ad9f808a80f9b44a1365ecf996,2024-10-21T13:15:02.503000 +CVE-2024-47724,1,1,375d295b4b555e4a55c7c393eb1679ce2fe017cfc731deb98cad02f430856d38,2024-10-21T13:15:02.590000 +CVE-2024-47725,1,1,b79a6560c527f091d68257ddb74e94911f4fcbffe10ad15a9906e1aa2b188955,2024-10-21T13:15:02.673000 +CVE-2024-47726,1,1,ede7839a0c8acec952f82045fbfdbe5b92376829a7aa3facea09d0bd51e5f2fc,2024-10-21T13:15:02.767000 +CVE-2024-47727,1,1,dcf0748ec8d3d168831660afdaa5da26177b1ee570017f7c2ef891706ff772fa,2024-10-21T13:15:02.883000 +CVE-2024-47728,1,1,abae274e2d2778936cf38f14084a8fe11f9bd1cb15fed353fd8109f0e5fd5178,2024-10-21T13:15:02.980000 +CVE-2024-47729,1,1,6612c7903d3ae0f9b01cd016de45de459fb5c35f6f8acae8368484137e0e8d09,2024-10-21T13:15:03.070000 CVE-2024-4773,0,0,451efafbcecc3ef1a9913dd6e3fbbf39d79f9aa10bbe1841409a244ef36a044e,2024-08-01T13:59:35.080000 +CVE-2024-47730,1,1,36342a45cbb61d151da202a59ad6b2bf39c02329ba5a29a671bae6f75890175a,2024-10-21T13:15:03.160000 +CVE-2024-47731,1,1,432d57f919d4c243aa1cb80b0a12b4e5b5ab00c9ddb34e870dfa9b8186c81289,2024-10-21T13:15:03.260000 +CVE-2024-47732,1,1,6a8faca5f298b17729a0a4a51112fdde4cea3ff51d7fa742504e78e15927930b,2024-10-21T13:15:03.363000 +CVE-2024-47733,1,1,9743935f3313458bce656023f8f2aebfa38931d2f1d32e49313ec858079f18c9,2024-10-21T13:15:03.450000 +CVE-2024-47734,1,1,7ed8c7f2a19f88c5f236f14e55851d3a22258c853d23ed72635f86335f39e3d2,2024-10-21T13:15:03.547000 +CVE-2024-47735,1,1,92d753052ca73aaa6f073467cfba232d319060257957d43bd3d1ce615d3c8a11,2024-10-21T13:15:03.630000 +CVE-2024-47736,1,1,1051c32df6c4c0a302a480e20bdbfcfddb7af748ced5516c7f98517eb106eb0b,2024-10-21T13:15:03.737000 +CVE-2024-47737,1,1,df034a83b259925e63950b2ee0ea49428075a92848078895db2a3944c21234f4,2024-10-21T13:15:03.833000 +CVE-2024-47738,1,1,90a8d040a2697ce8c2912c8c1ff92fa630ee4e2a8287fb4edb014122d97dec09,2024-10-21T13:15:03.920000 +CVE-2024-47739,1,1,6098aca53dbeda33dcbeb115807179704b14fa86a9df808b9ef27ae03c7a03ea,2024-10-21T13:15:04.017000 CVE-2024-4774,0,0,a30e3c0a9681e5745664b5a7d21e43f4931cba5ae0f7ac5d13f7a53db899f70a,2024-05-14T19:17:55.627000 +CVE-2024-47740,1,1,1ba25863b96f3c25783b38e7542e25644f0f17f0eecee048a45aa7993beadb69,2024-10-21T13:15:04.103000 +CVE-2024-47741,1,1,8a07e2c5308823a019af99f817993f158fc1f74e8f62321f0845f848c6b8d9fd,2024-10-21T13:15:04.207000 +CVE-2024-47742,1,1,4e9ae2b973829e67a08f6cf2a772e8a07b361bd954624e7c2e7dd75541af581c,2024-10-21T13:15:04.297000 +CVE-2024-47743,1,1,82efe9eaf56efbd2fb468344b3b355d343d780c9341a2b55ff3eda1dca6e0639,2024-10-21T13:15:04.393000 +CVE-2024-47744,1,1,318c76b642310d705c90f729b7897077bd5b0e04e26bdf03ae888cefe59bec2b,2024-10-21T13:15:04.480000 +CVE-2024-47745,1,1,cc64ed51ebe39a8f749cc9bb1d98789a41c199b6bdb64fbade08362f41dbb228,2024-10-21T13:15:04.580000 +CVE-2024-47746,1,1,a4744b1d4b6215114a6aff1ceb463b84325e6269d8a3b265a028abd3e5a4ff45,2024-10-21T13:15:04.667000 +CVE-2024-47747,1,1,6ddd27f7517098d2d02e638459b1087d7d4767bf3164361c1c18dcd39b39bdcb,2024-10-21T13:15:04.753000 +CVE-2024-47748,1,1,2e9524d14b02ce9e8e6466840d93e483faa2ffcf2286310427bd5b3e0176040b,2024-10-21T13:15:04.857000 +CVE-2024-47749,1,1,e8633928e58908d9cb3e890f7bf6015d9ceb47a502719021defbdb812fce5be3,2024-10-21T13:15:04.950000 CVE-2024-4775,0,0,e28694f3b8983e1ffd74471dfd44709d0dccce69f1a573f2d66ebeb202246c51,2024-07-03T02:08:07.390000 +CVE-2024-47750,1,1,6dee46414fd845ec3ca01a1853a2bade8dc19320d6151808543607da04302efe,2024-10-21T13:15:05.037000 +CVE-2024-47751,1,1,6195fb12c8e3a1b0cf47c6075b83794a76688392db1a181db4bcd4dc1cf59291,2024-10-21T13:15:05.123000 +CVE-2024-47752,1,1,9699a3c05e2b76622b9afc00a0e6f96eb6810043fc8e182819fc1f920f49ea85,2024-10-21T13:15:05.203000 +CVE-2024-47753,1,1,4e8047dd952b59a130eaecb8249d957f5d43d107701456368e9594282d790eed,2024-10-21T13:15:05.283000 +CVE-2024-47754,1,1,0354436191e7d7599677bc5984d3ca5548c3663214f10b8e19cc91073ccbc9fe,2024-10-21T13:15:05.377000 +CVE-2024-47755,1,1,7b5941b98b9cf2b2445668a331f326542b689efc2ae2573b182fea74668f57f1,2024-10-21T13:15:05.467000 +CVE-2024-47756,1,1,dc95a56aced49d607f4cdd78a589c17960e23d0830ca49f8c92e01c022fa2331,2024-10-21T13:15:05.550000 +CVE-2024-47757,1,1,b17e946be16b7cc7e865b765e4d1f804c48577343a958838720833592392b2b8,2024-10-21T13:15:05.640000 CVE-2024-4776,0,0,8d62a3fb449cd595ed01f29a43c4395459263028a3240838c3f471dfed40e010,2024-07-03T02:08:08.187000 CVE-2024-47762,0,0,faf4eb81ce6d805e421dff7a7d50a27f6affd6a56e4bb98171a2180279fc1ecf,2024-10-04T13:50:43.727000 CVE-2024-47763,0,0,0009d92633a66a995666b904976a3f571897c7b107ff706ed2173ff97f66c3ef,2024-10-10T12:51:56.987000 @@ -262209,6 +262293,7 @@ CVE-2024-4820,0,0,832738c431d4032e72cf5367ea2c2310b7c6cd840d9bc0fc3f10b9e1f0e05e CVE-2024-4821,0,0,dc7d4132f68a39a1fe6c6bac80c0ac3156e2e90bf5e433ad24749311cb9093af,2024-06-11T17:29:33.213000 CVE-2024-4822,0,0,35737e7a1acb373d4b9b0a7db2a81b8ded4d641f08c88a2e676b684417908472,2024-05-14T16:11:39.510000 CVE-2024-4823,0,0,0c5de98ac761e11f69c407a8dbff0028d3fe4b31e8abb3e2bfd72a91e6adb2ed,2024-05-14T16:11:39.510000 +CVE-2024-48231,1,1,42dec53a830134c621c886e100f6e484596524a35af1c515691dd2bc2d7ed207,2024-10-21T13:15:05.720000 CVE-2024-4824,0,0,e31432116aed0554c3dc4b1001cfc03d00512889f9f84533cba85f3e0d8e9591,2024-05-14T16:11:39.510000 CVE-2024-48249,0,0,da8b8817e37741a9aa47e2e2d74b7c2d9016e75eaeb0e762d84c505d09bf271b,2024-10-15T18:35:15.607000 CVE-2024-4825,0,0,155a89a5474625dde1ab63dcac3020c23f71c92d3744c7dbee990f6fffb4feb0,2024-05-14T16:11:39.510000 @@ -262441,6 +262526,7 @@ CVE-2024-4927,0,0,4ddbe2418b736eceb0ee18662dc9ab0b7588d5e8a0dde06117bae0c9075b36 CVE-2024-49270,0,0,616a2e437b03b1730ae710990d1f9b5d13bcf5a41263b98d33736d5e3831391d,2024-10-16T16:38:14.557000 CVE-2024-49271,0,0,6fd9d076a620483355861bd31b6d3fba7a6e8c77968d9b9b52f107ebea5c9f8b,2024-10-16T16:38:14.557000 CVE-2024-49272,0,0,6005fa9a888a1eeaa182b2aa818956ae0a6b05ce74c9bd899267ff9a3002fa9c,2024-10-20T11:15:02.650000 +CVE-2024-49273,1,1,7e20cd8ea0243666b7a04c3f2f1bfcea668080cd37a4a643b756062432ac9f76,2024-10-21T12:15:08.450000 CVE-2024-49274,0,0,a233e4bc15eff903b2c2d5e8618b07413f960b599063e587f67c7ae40a18a5cb,2024-10-20T11:15:02.863000 CVE-2024-49275,0,0,76b178cba6823b7b39e33385b621b5ef1a887fac280d97bdd39b76c4523c5042,2024-10-20T11:15:03.063000 CVE-2024-49276,0,0,6a6b58791e9512e826c457e3bee8f08f7b1de60db24c986554adb1b116c01f0f,2024-10-18T12:52:33.507000 @@ -262462,6 +262548,7 @@ CVE-2024-4929,0,0,6b801c4c5a7fb7e65ec83572f903c6a563e938f183cb222d57e6a2e2374611 CVE-2024-49290,0,0,eb6bcb41e5eb7444117c64e0179e6cd34e2e2c74d6a8e77c1f29691623d12961,2024-10-20T11:15:03.260000 CVE-2024-49291,0,0,44e011055ffcc94f31147e91008bfca453f458c355b4c10d5e081a4748d73d9a,2024-10-18T12:52:33.507000 CVE-2024-49292,0,0,5f09a14990b6c411313ed3c0517e00101a5bacb90324a262f26a26dc9ec6f772,2024-10-18T12:52:33.507000 +CVE-2024-49293,1,1,aa52ccb0b4a8375a04232bb23f1dd642f62b98fa282ab0bf1aa0530d7f127f9d,2024-10-21T12:15:08.683000 CVE-2024-49295,0,0,2233f6c9986d9f1a990d0d54b1c1d91ca1475b5db77026f702ef776949b63fa2,2024-10-18T12:52:33.507000 CVE-2024-49296,0,0,f1042f70e89016c7f4e9d2a0f572f4f930b555774f6b329b232673bc13de033a,2024-10-18T12:52:33.507000 CVE-2024-49297,0,0,c01c0683901cb1b114e43805eef512c87c392594a83094740c5f93a462c76e65,2024-10-18T12:52:33.507000 @@ -262489,6 +262576,7 @@ CVE-2024-49318,0,0,02cca54ff58508f7015bdc78b225c5402ac891d24584c9a2512f1a35e3987 CVE-2024-49319,0,0,42677cde087b60b4589de437a49f5349c2181024ba44b1ead05df0b607435f60,2024-10-18T12:52:33.507000 CVE-2024-4932,0,0,c4279e0e81804cf3f06e3c52edfd706c295877ccc3771ef54ad83261fb500b37,2024-05-17T02:40:43.357000 CVE-2024-49320,0,0,f646a0aed9b94f9c2a4b6085270ae6d0667dce332670da7784078783e12bfcb6,2024-10-18T12:52:33.507000 +CVE-2024-49321,1,1,00602def11659531ebafac7f536b903f4062098349e9e7c2156599e08e1401ef,2024-10-21T12:15:08.893000 CVE-2024-49322,0,0,541e4efebd0d76588052862000e37b2e98e8b9ac15619c2b0422f26ed3288fd3,2024-10-18T12:52:33.507000 CVE-2024-49323,0,0,a0c9fe1ee25043a5c6ce05b64b3da5b674bffb891728ab885f2c49640cf68957,2024-10-20T08:15:03.460000 CVE-2024-49324,0,0,cc2f963c5f422ee0027ce69cf8bf6eafe929476dcf60ea9a2e07206d47bfbab4,2024-10-20T09:15:03.227000 @@ -262592,6 +262680,19 @@ CVE-2024-4980,0,0,1d2b61808b4cae121d6a29c34adc83b7ce102dcc100d7578fef807794b8506 CVE-2024-4983,0,0,47e5eccd768078063df4e275a1ffdcd617ddbc2b7b8451c89e2e261cf23ec523,2024-06-27T12:47:19.847000 CVE-2024-4984,0,0,9f2b9cbe42298dc633fd7a95b66e0d4fdcec1b53d37f19261bcfa2f1a75e3637,2024-05-16T13:03:05.353000 CVE-2024-4985,0,0,df226dda87642aeec36f0fe802a8cb1e52b5f8e667dcfe00ff42a5cc0d642f7f,2024-05-21T12:37:59.687000 +CVE-2024-49850,1,1,81e39aabe6d7cf602d5a3961a2cd4909d8604493c82805ea87c561555c9d80a1,2024-10-21T13:15:05.797000 +CVE-2024-49851,1,1,ff48b9b6433475e3e4e79fd0738408ff418d755e5e4885bddccb2b352b4fe3de,2024-10-21T13:15:05.883000 +CVE-2024-49852,1,1,c52bab8531db091d06488a98aef027bc8b53973f848c3c9a3954555efc4a5752,2024-10-21T13:15:05.977000 +CVE-2024-49853,1,1,3d9ea39f76afbaec0504f6b09f6e1ef2b6aacb4870a2b7436af6070725008648,2024-10-21T13:15:06.083000 +CVE-2024-49854,1,1,7732cd96e5aede20ca3921413c27338efa1c9177cc39f7151175f2100c390f66,2024-10-21T13:15:06.203000 +CVE-2024-49855,1,1,05b6fb19bbafe74f441a2c2634f8460851a004c85b77b65656587403c012b3b9,2024-10-21T13:15:06.270000 +CVE-2024-49856,1,1,b537355e99a1e7cc49f58e6ad9c832e9e87765e276d136535381dd71771dbf21,2024-10-21T13:15:06.353000 +CVE-2024-49857,1,1,b430ca56627c1d1dcfd87251a1e7d623627f55f519cffdc61a1a3fe3749a7e30,2024-10-21T13:15:06.447000 +CVE-2024-49858,1,1,7dcb59b5727e376f27170eb27270b30af4756b049d5f621a7b6ef403bf1f8a5a,2024-10-21T13:15:06.543000 +CVE-2024-49859,1,1,3d4e004978b918cf35760ca264c25b8048dd71f247a8aff449c868123ec97212,2024-10-21T13:15:06.627000 +CVE-2024-49860,1,1,26a9aa7a71fc77fdb26c4ea43d5056f4bdeeb2e34f581b6e9eb706215bdce0c9,2024-10-21T13:15:06.723000 +CVE-2024-49861,1,1,be8c233885edb763a0218dd2d9109e999f273171e2e460d07d8ccdca3f00ae57,2024-10-21T13:15:06.800000 +CVE-2024-49862,1,1,3db26bd3875a27aba01e150640ca73a58bf814959fab4c8ee43dcc33d12801af,2024-10-21T13:15:06.893000 CVE-2024-4988,0,0,ff557f66f633c813e65ed42f6b56820b4233d3efc23d00548e6797ba166f3d35,2024-08-21T03:15:05.460000 CVE-2024-4991,0,0,3aef226cc1578adb6c75565d63e7f13bcda4a2e79607b48e5e73e305c3d938d8,2024-05-16T13:03:05.353000 CVE-2024-4992,0,0,e061228a83f2d41e21e64f404fd50aefb3a354b638438e4cf4870e41885d01e3,2024-05-16T13:03:05.353000 @@ -263664,7 +263765,7 @@ CVE-2024-6203,0,0,3b9c553aeaabf6b65504ab651e97d9d81983015dea0894c7aa9459e33da609 CVE-2024-6204,0,0,03d37f06023f0b3304d0d42810d35c838ae110ad51b8135626af35ef3589502f,2024-09-19T15:41:37.263000 CVE-2024-6205,0,0,f32ee6375b433f4c8b075d7f2127800e855cae97c6ef2c703b09eff01b808353,2024-08-01T14:00:15.120000 CVE-2024-6206,0,0,6f603126f815a80c6debdb2c8fc884bf16912b4470febb5eed843e2704856d15,2024-08-08T14:35:13.290000 -CVE-2024-6207,0,0,6717075304f5a65da29436540a1da547d648f899e033516b50da48927be13795,2024-10-15T12:57:46.880000 +CVE-2024-6207,0,1,b52c7642eebbcc95d2e1891b72bbf3cc2d7047022bdfa87d5a74cc0a9d9e7679,2024-10-21T13:20:45.617000 CVE-2024-6208,0,0,b702d385d6dc69624ae253d69a727703b76fa8f218fc0fa3e0a52d494810eb10,2024-08-01T12:42:36.933000 CVE-2024-6209,0,0,dde817e69ddab612402867a39af366fc36713e43c4758f0a34432256fd885f93,2024-07-08T15:35:25.837000 CVE-2024-6210,0,0,d08d160d43811c5bb8dcf64fef0c280a0a7b1e98d094babc485e09ce9fa86125,2024-07-11T13:05:54.930000 @@ -266249,4 +266350,4 @@ CVE-2024-9982,0,0,d639d3774aff1cdbd050ebd7eeccc640e7241022f36e4718db9aa208221201 CVE-2024-9983,0,0,05b40e9cfe77e2a0c57e66e13edd76f3cb7232b22c3913645dde67dce8485932,2024-10-16T22:03:42.020000 CVE-2024-9984,0,0,8e8b1dff68b77e14ce417f91873fee227d0458654a790688014355062c7539a9,2024-10-16T22:03:23.407000 CVE-2024-9985,0,0,35f031595deb3bfd21882874fada51cff590c3c6a37f03f4259fa4136f5b9157,2024-10-16T22:02:08.117000 -CVE-2024-9986,0,0,81bb0bc1241c76a4c7d183557b7c4426ae7d356c2fe71d5a28d1ab430e0b90ba,2024-10-16T16:38:43.170000 +CVE-2024-9986,0,1,f83b3609bd670a0cfc3a1c687a45465cc896c6d69e9f1c37efb33a43ca882e79,2024-10-21T13:07:47.700000